Search criteria
26 vulnerabilities found for seil\/x2 by iij
VAR-201103-0115
Vulnerability from variot - Updated: 2023-12-18 13:49Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------
Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).
http://secunia.com/company/events/mms_2011/
TITLE: SEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA43494
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43494/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43494
RELEASE DATE: 2011-03-18
DISCUSS ADVISORY: http://secunia.com/advisories/43494/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43494/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43494
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in SEIL Routers, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is reported in the following products: * SEIL/x86 firmware 1.00 to 1.61. * SEIL/B1 firmware 1.00 to 3.11. * SEIL/X1 firmware 1.00 to 3.11. * SEIL/X2 firmware 1.00 to 3.11. * SEIL/Turbo firmware 1.80 to 2.10.
SOLUTION: Update to a patched version.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.seil.jp/support/security/a01001.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201103-0115",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.82"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.04"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.81"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.84"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.61"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.03"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.03"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.91"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.02"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.08"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.92"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.90"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.07"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.82"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.04"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.06"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.99"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.91"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.02"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.06"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.96"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.92"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.07"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.95"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.83"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.81"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.95"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.94"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.85"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.99"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.96"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.93"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.09"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.98"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.83"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.94"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.84"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.85"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.93"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.09"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.98"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.08"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.90"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.61"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.11"
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.10"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.10"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.11"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.61"
},
{
"model": "turbo",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "neu 2fe plus",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0454"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor",
"sources": [
{
"db": "BID",
"id": "46598"
}
],
"trust": 0.3
},
"cve": "CVE-2011-0454",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 8.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2011-000014",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"id": "VHN-48399",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-0454",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2011-000014",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201103-009",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-48399",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA43494\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43494/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nRELEASE DATE:\n2011-03-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43494/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43494/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL Routers, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is reported in the following products:\n* SEIL/x86 firmware 1.00 to 1.61. \n* SEIL/B1 firmware 1.00 to 3.11. \n* SEIL/X1 firmware 1.00 to 3.11. \n* SEIL/X2 firmware 1.00 to 3.11. \n* SEIL/Turbo firmware 1.80 to 2.10. \n\nSOLUTION:\nUpdate to a patched version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.seil.jp/support/security/a01001.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "PACKETSTORM",
"id": "99440"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN88991166",
"trust": 3.4
},
{
"db": "NVD",
"id": "CVE-2011-0454",
"trust": 3.4
},
{
"db": "SECUNIA",
"id": "43494",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014",
"trust": 2.5
},
{
"db": "BID",
"id": "46598",
"trust": 2.2
},
{
"db": "XF",
"id": "65672",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2011-0817",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#88991166",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-48399",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "99440",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "PACKETSTORM",
"id": "99440"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"id": "VAR-201103-0115",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
}
],
"trust": 1.2042633255555555
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
}
]
},
"last_update_date": "2023-12-18T13:49:15.771000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a01001(Japanese)",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"title": "Patch for SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/3112"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://secunia.com/advisories/43494"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/46598"
},
{
"trust": 1.8,
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"trust": 1.7,
"url": "http://jvn.jp/en/jp/jvn88991166/index.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2011-000014"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0454"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/english/vuln/201102_seil_en.html"
},
{
"trust": 0.8,
"url": "http://xforce.iss.net/xforce/xfdb/65672"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn88991166"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0454"
},
{
"trust": 0.6,
"url": "http://jvn.jp/jp/jvn88991166/index.htmlhttp"
},
{
"trust": 0.3,
"url": "http://jvn.jp/jp/jvn88991166/index.html"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/download/firmware/"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/company/events/mms_2011/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/43494/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/43494/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "PACKETSTORM",
"id": "99440"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "PACKETSTORM",
"id": "99440"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-03-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"date": "2011-03-01T00:00:00",
"db": "VULHUB",
"id": "VHN-48399"
},
{
"date": "2011-02-28T00:00:00",
"db": "BID",
"id": "46598"
},
{
"date": "2011-02-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"date": "2011-03-18T07:48:13",
"db": "PACKETSTORM",
"id": "99440"
},
{
"date": "2011-03-01T23:00:02.800000",
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"date": "2011-03-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-03-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-48399"
},
{
"date": "2011-02-28T00:00:00",
"db": "BID",
"id": "46598"
},
{
"date": "2011-02-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"date": "2017-08-17T01:33:30.930000",
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"date": "2011-03-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "BID",
"id": "46598"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
],
"trust": 0.6
}
}
VAR-200912-0195
Vulnerability from variot - Updated: 2023-12-18 13:30Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. Successfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA37154
VERIFY ADVISORY: http://secunia.com/advisories/37154/
DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
1) An error exists when processing of certain GRE packets.
Note: Successful exploitation requires that the NAT functionality is enabled.
2) A buffer overflow error exists within the URL filtering functionality. This can be exploited to cause a buffer overflow and potentially execute arbitrary code by tricking a user into visiting a specially crafted website.
Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.
SOLUTION: Update to version 2.52.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php
2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200912-0195",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.30 to 2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.30 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.30 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
}
],
"sources": [
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4293"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JPCERT/CC",
"sources": [
{
"db": "BID",
"id": "36896"
}
],
"trust": 0.3
},
"cve": "CVE-2009-4293",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2009-000070",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-41739",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-4293",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2009-000070",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200912-157",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-41739",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. \nSuccessfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. This can be exploited to cause a buffer overflow and\npotentially execute arbitrary code by tricking a user into visiting a\nspecially crafted website. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "PACKETSTORM",
"id": "82299"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN13011682",
"trust": 2.9
},
{
"db": "NVD",
"id": "CVE-2009-4293",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "37154",
"trust": 2.7
},
{
"db": "OSVDB",
"id": "59361",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2009-3111",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070",
"trust": 2.5
},
{
"db": "XF",
"id": "54050",
"trust": 1.4
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#13011682",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN06362164",
"trust": 0.4
},
{
"db": "BID",
"id": "36896",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-41739",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "82299",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"id": "VAR-200912-0195",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
}
],
"trust": 0.5871794866666666
},
"last_update_date": "2023-12-18T13:30:13.771000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00674.php",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-16",
"trust": 1.1
},
{
"problemtype": "CWE-20",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://jvn.jp/en/jp/jvn13011682/index.html"
},
{
"trust": 2.5,
"url": "http://osvdb.org/59361"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/37154"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"trust": 2.1,
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000070.html"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/54050"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4293"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4293"
},
{
"trust": 0.4,
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"trust": 0.3,
"url": "http://jvn.jp/en/jp/jvn06362164/index.html"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn13011682/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn06362164/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/37154/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-12-10T00:00:00",
"db": "VULHUB",
"id": "VHN-41739"
},
{
"date": "2009-11-02T00:00:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"date": "2009-10-28T10:48:16",
"db": "PACKETSTORM",
"id": "82299"
},
{
"date": "2009-12-10T23:30:00.420000",
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"date": "2009-12-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-41739"
},
{
"date": "2010-08-11T11:34:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"date": "2017-08-17T01:31:31.773000",
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"date": "2009-12-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X Series and SEIL/B1 denial of service vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "configuration error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
],
"trust": 0.6
}
}
VAR-200912-0194
Vulnerability from variot - Updated: 2023-12-18 13:30Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA37154
VERIFY ADVISORY: http://secunia.com/advisories/37154/
DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
1) An error exists when processing of certain GRE packets. This can be exploited to cause the device to restart by sending certain specially crafted GRE packets.
Note: Successful exploitation requires that the NAT functionality is enabled.
2) A buffer overflow error exists within the URL filtering functionality.
Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.
SOLUTION: Update to version 2.52.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php
2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200912-0194",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.40 to 2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.40 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.40 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
}
],
"sources": [
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4292"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JPCERT/CC",
"sources": [
{
"db": "BID",
"id": "36896"
}
],
"trust": 0.3
},
"cve": "CVE-2009-4292",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2009-000069",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-41738",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-4292",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2009-000069",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200912-156",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-41738",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. This can\nbe exploited to cause the device to restart by sending certain\nspecially crafted GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "PACKETSTORM",
"id": "82299"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN06362164",
"trust": 2.9
},
{
"db": "NVD",
"id": "CVE-2009-4292",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "37154",
"trust": 2.7
},
{
"db": "VUPEN",
"id": "ADV-2009-3111",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "59362",
"trust": 1.7
},
{
"db": "XF",
"id": "54050",
"trust": 0.8
},
{
"db": "OSVDB",
"id": "59361",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#06362164",
"trust": 0.6
},
{
"db": "XF",
"id": "54051",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN13011682",
"trust": 0.4
},
{
"db": "BID",
"id": "36896",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-41738",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "82299",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"id": "VAR-200912-0194",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
}
],
"trust": 0.5871794866666666
},
"last_update_date": "2023-12-18T13:30:13.735000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00669.php",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://jvn.jp/en/jp/jvn06362164/index.html"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/37154"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"trust": 2.1,
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000069.html"
},
{
"trust": 1.7,
"url": "http://osvdb.org/59362"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4292"
},
{
"trust": 0.8,
"url": "http://xforce.iss.net/xforce/xfdb/54050"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4292"
},
{
"trust": 0.8,
"url": "http://osvdb.org/59361"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/54051"
},
{
"trust": 0.4,
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"trust": 0.3,
"url": "http://jvn.jp/en/jp/jvn13011682/index.html"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn13011682/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn06362164/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/37154/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-12-10T00:00:00",
"db": "VULHUB",
"id": "VHN-41738"
},
{
"date": "2009-11-02T00:00:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"date": "2009-10-28T10:48:16",
"db": "PACKETSTORM",
"id": "82299"
},
{
"date": "2009-12-10T23:30:00.390000",
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"date": "2009-12-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-41738"
},
{
"date": "2010-08-11T11:34:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"date": "2017-08-17T01:31:31.693000",
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"date": "2009-12-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X Series and SEIL/B1 buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
],
"trust": 0.6
}
}
VAR-201310-0458
Vulnerability from variot - Updated: 2023-12-18 13:29The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. Attackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. The following products are vulnerable: SEIL/x86 1.00 through 2.81 SEIL/X1 1.00 through 4.31 SEIL/X2 1.00 through 4.31 SEIL/B1 1.00 through 4.31 SEIL/Turbo 2.05 through 2.15 SEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201310-0458",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.80"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "seil/b1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.30"
},
{
"model": "seil/neu 2fe plus",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.15"
},
{
"model": "seil/turbo",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.15"
},
{
"model": "seil/x1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.30"
},
{
"model": "seil/x2",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.30"
},
{
"model": "seil/x86",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 2.80"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x86",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.81"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/neu 2fe plus",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.61"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/turbo",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.80"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4708"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "62612"
}
],
"trust": 0.3
},
"cve": "CVE-2013-4708",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2013-000091",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2013-13386",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"id": "VHN-64710",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-4708",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2013-000091",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2013-13386",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201309-504",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-64710",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. \nAttackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. \nThe following products are vulnerable:\nSEIL/x86 1.00 through 2.81\nSEIL/X1 1.00 through 4.31\nSEIL/X2 1.00 through 4.31\nSEIL/B1 1.00 through 4.31\nSEIL/Turbo 2.05 through 2.15\nSEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "VULHUB",
"id": "VHN-64710"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-4708",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVN40079308",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "97619",
"trust": 1.7
},
{
"db": "BID",
"id": "62612",
"trust": 1.6
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504",
"trust": 0.7
},
{
"db": "SECUNIA",
"id": "54818",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2013-13386",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#40079308",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-64710",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"id": "VAR-201310-0458",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
}
],
"trust": 1.2519099900000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
}
]
},
"last_update_date": "2023-12-18T13:29:52.352000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"title": "SEIL Multiple Products RADIUS Verification Random Number Generation Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/39884"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"trust": 1.7,
"url": "http://jvn.jp/en/jp/jvn40079308/index.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/ja/contents/2013/jvndb-2013-000091.html"
},
{
"trust": 1.7,
"url": "http://osvdb.org/97619"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4708"
},
{
"trust": 0.8,
"url": "https://jvn.jp/en/jp/jvn40079308/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4708"
},
{
"trust": 0.6,
"url": "http://www.secunia.com/advisories/54818/"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/62612"
},
{
"trust": 0.3,
"url": "http://jvn.jp/jp/jvn40079308/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"date": "2013-10-01T00:00:00",
"db": "VULHUB",
"id": "VHN-64710"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62612"
},
{
"date": "2013-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"date": "2013-10-01T17:55:03.647000",
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"date": "2013-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"date": "2013-10-07T00:00:00",
"db": "VULHUB",
"id": "VHN-64710"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62612"
},
{
"date": "2013-10-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"date": "2013-10-07T14:06:42.800000",
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"date": "2014-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable in RADIUS authentication",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
],
"trust": 0.6
}
}
VAR-201309-0394
Vulnerability from variot - Updated: 2023-12-18 13:14Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan's SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data Attackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201309-0394",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.81"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil/b1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.31"
},
{
"model": "seil/neu 2fe plus",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.05 to 2.15"
},
{
"model": "seil/turbo",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.05 to 2.15"
},
{
"model": "seil/x1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.31"
},
{
"model": "seil/x2",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.31"
},
{
"model": "seil/x86",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 2.81"
},
{
"model": "seil/neu 2fe plus to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "2.052.15"
},
{
"model": "seil/turbo to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "2.052.15"
},
{
"model": "seil/b1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.31"
},
{
"model": "seil/x2 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.31"
},
{
"model": "seil/x1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.31"
},
{
"model": "seil/x86 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.002.81"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.61"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "turbo",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "neu 2fe plus",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.05"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.05"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x86",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.82"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.81"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x2_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4709"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "62593"
}
],
"trust": 0.3
},
"cve": "CVE-2013-4709",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2013-000092",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-13230",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-64711",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-4709",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2013-000092",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-13230",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201309-351",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-64711",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan\u0027s SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data\nAttackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "VULHUB",
"id": "VHN-64711"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-4709",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092",
"trust": 2.8
},
{
"db": "JVN",
"id": "JVN43152129",
"trust": 2.8
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-13230",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#43152129",
"trust": 0.6
},
{
"db": "BID",
"id": "62593",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-64711",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"id": "VAR-201309-0394",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
}
],
"trust": 1.1914468853333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
}
]
},
"last_update_date": "2023-12-18T13:14:55.037000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"title": "Patch for SEIL Series Router PPPACL L2TP Message Processing Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/39771"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"trust": 2.0,
"url": "http://jvn.jp/en/jp/jvn43152129/index.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000092"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4709"
},
{
"trust": 0.8,
"url": "https://jvn.jp/en/jp/jvn43152129/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=http://support.apple.com/kb/cve-2013-4709"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/download/firmware/"
},
{
"trust": 0.3,
"url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000092.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"date": "2013-09-20T00:00:00",
"db": "VULHUB",
"id": "VHN-64711"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62593"
},
{
"date": "2013-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"date": "2013-09-20T15:26:04.230000",
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"date": "2013-09-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"date": "2015-03-05T00:00:00",
"db": "VULHUB",
"id": "VHN-64711"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62593"
},
{
"date": "2013-09-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"date": "2015-03-05T13:24:10.220000",
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"date": "2014-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to buffer overflow",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
],
"trust": 0.6
}
}
VAR-201406-0099
Vulnerability from variot - Updated: 2023-12-18 13:09The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. The following are vulnerable: SEIL/x86 1.00 to 3.10 SEIL/X1 1.00 to 4.50 SEIL/X2 1.00 to 4.50 SEIL/B1 1.00 to 4.50 SEIL/Turbo 1.80 to 2.17 SEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201406-0099",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.17"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.16"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.81"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.82"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.50"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.80"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.17"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.50"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.16"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.50"
},
{
"model": "seil/neu 2fe plus",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.17"
},
{
"model": "seil/turbo",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.17"
},
{
"model": "seil/x1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.50"
},
{
"model": "seil/x2",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.50"
},
{
"model": "seil/x86",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.10"
},
{
"model": "seil/neu 2fe plus to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.802.17"
},
{
"model": "seil/turbo to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.802.17"
},
{
"model": "seil/b1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.50"
},
{
"model": "seil/x2 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.50"
},
{
"model": "seil/x1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.50"
},
{
"model": "seil/x86 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.003.10"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.61"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2004"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "68041"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2004",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2014-000055",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-03732",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-69943",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2004",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2014-000055",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2014-03732",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201406-323",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-69943",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. \nThe following are vulnerable:\nSEIL/x86 1.00 to 3.10\nSEIL/X1 1.00 to 4.50\nSEIL/X2 1.00 to 4.50\nSEIL/B1 1.00 to 4.50\nSEIL/Turbo 1.80 to 2.17\nSEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "VULHUB",
"id": "VHN-69943"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2004",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055",
"trust": 2.5
},
{
"db": "JVN",
"id": "JVN10724763",
"trust": 2.5
},
{
"db": "BID",
"id": "68041",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-03732",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-69943",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"id": "VAR-201406-0099",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
}
],
"trust": 1.2151310215384614
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
}
]
},
"last_update_date": "2023-12-18T13:09:21.202000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"title": "SEIL Series Routers patch for remote denial of service vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/46479"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://jvn.jp/en/jp/jvn10724763/index.html"
},
{
"trust": 1.7,
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000055"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2004"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2004"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/68041"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"date": "2014-06-16T00:00:00",
"db": "VULHUB",
"id": "VHN-69943"
},
{
"date": "2014-06-13T00:00:00",
"db": "BID",
"id": "68041"
},
{
"date": "2014-06-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"date": "2014-06-16T14:55:05.893000",
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"date": "2014-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"date": "2014-06-16T00:00:00",
"db": "VULHUB",
"id": "VHN-69943"
},
{
"date": "2014-06-13T00:00:00",
"db": "BID",
"id": "68041"
},
{
"date": "2014-06-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"date": "2014-06-16T17:10:13.190000",
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"date": "2014-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
],
"trust": 0.6
}
}
VAR-201502-0480
Vulnerability from variot - Updated: 2023-12-18 12:30npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. The following products are vulnerable: SEIL/x86 Fuji 1.00 through 3.30 SEIL/X1 3.50 through 4.70 SEIL/X2 3.50 through 4.70 SEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201502-0480",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.29"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.28"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.26"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.35"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.32"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.27"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.33"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.34"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.46"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.90"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.60"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.96"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.96"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.95"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.70"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.41"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.05"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.04"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.90"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.60"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.93"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.45"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.90"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.07"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.89"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.19"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.82"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.16"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.22"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.99"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.98"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.14"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.92"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.13"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.83"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.87"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.71"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.90"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.78"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.74"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.85"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.81"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.12"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.44"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.92"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.11"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.25"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.51"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.60"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.56"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.81"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.00"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.39"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.49"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.13"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.58"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.16"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.03"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.80"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.34"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.21"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.98"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.03"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.40"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.07"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.00"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.95"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.02"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.19"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.94"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.83"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.04"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.85"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.18"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.41"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.08"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.65"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.48"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.06"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.79"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.93"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.47"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.17"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.55"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.57"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.87"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.88"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.21"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.77"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.34"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.79"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.40"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.18"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.78"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.15"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.84"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.86"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.76"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.08"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.99"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.36"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.90"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.60"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.17"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.06"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.24"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.86"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.14"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.09"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.97"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.84"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.94"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.59"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.88"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.43"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.23"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.89"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.97"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.67"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.37"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.77"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.66"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.71"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.60"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.09"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.69"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.12"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.76"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.72"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.38"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.64"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.54"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.82"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.73"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.34"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.68"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.00"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.50 to 4.70"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.50 to 4.70"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.50 to 4.70"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.30"
},
{
"model": "seil/b1 routers",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.50-4.70"
},
{
"model": "seil/x2 routers",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.50-4.70"
},
{
"model": "seil/x1 router",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.50-4.70"
},
{
"model": "seil/x86 fuji routers",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "1.00-3.30"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.30"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.22"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.70"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.70"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.62"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.70"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.62"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.70"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.62"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.50"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.66:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.67:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.76:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.76:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.79:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.86:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.97:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.79:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.86:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.97:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.78:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.87:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.69:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.78:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.87:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0887"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JPCERT",
"sources": [
{
"db": "BID",
"id": "72884"
}
],
"trust": 0.3
},
"cve": "CVE-2015-0887",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2015-000031",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-01395",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-78833",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-0887",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2015-000031",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-01395",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201502-477",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-78833",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. \nThe following products are vulnerable:\nSEIL/x86 Fuji 1.00 through 3.30\nSEIL/X1 3.50 through 4.70\nSEIL/X2 3.50 through 4.70\nSEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "VULHUB",
"id": "VHN-78833"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-0887",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVN63949115",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031",
"trust": 2.5
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-01395",
"trust": 0.6
},
{
"db": "BID",
"id": "72884",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-78833",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"id": "VAR-201502-0480",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
}
],
"trust": 1.4576923075
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
}
]
},
"last_update_date": "2023-12-18T12:30:23.515000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"title": "SEIL Router PPP Access Concentrator Denial of Service Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/55765"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://jvn.jp/en/jp/jvn63949115/index.html"
},
{
"trust": 1.7,
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2015-000031"
},
{
"trust": 1.4,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0887"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0887"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.3,
"url": " http://www.seil.jp/support/security/a01541.html "
},
{
"trust": 0.3,
"url": "jvn.jp/en/jp/jvn63949115/index.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-03-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"date": "2015-02-28T00:00:00",
"db": "VULHUB",
"id": "VHN-78833"
},
{
"date": "2015-02-27T00:00:00",
"db": "BID",
"id": "72884"
},
{
"date": "2015-02-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"date": "2015-02-28T02:59:37.923000",
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"date": "2015-02-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-03-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"date": "2015-03-04T00:00:00",
"db": "VULHUB",
"id": "VHN-78833"
},
{
"date": "2015-05-07T17:28:00",
"db": "BID",
"id": "72884"
},
{
"date": "2015-03-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"date": "2015-03-04T17:20:43.703000",
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"date": "2015-03-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
],
"trust": 0.6
}
}
VAR-201008-0257
Vulnerability from variot - Updated: 2023-12-18 12:22The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------
Secunia receives 'Frost & Sullivan's Global 2010 Customer Value Enhancement Award
Secunia outshines its competitors and receives the Frost & Sullivan’s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost & Sullivan concluded:
"Secunia provides tremendous value for their customers, end-users, and to other security vendors."
Read more: http://secunia.com/blog/117/
TITLE: SEIL Routers IPv6 Unicast RPF Spoofing Vulnerability
SECUNIA ADVISORY ID: SA41088
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41088/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41088
RELEASE DATE: 2010-08-26
DISCUSS ADVISORY: http://secunia.com/advisories/41088/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/41088/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=41088
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to conduct spoofing attacks.
The vulnerability is reported in the following products: * SEIL/X1 firmware version 1.00 through 2.73 * SEIL/X2 firmware version 1.00 through 2.73 * SEIL/B1 firmware version 1.00 through 2.73
SOLUTION: Upgrade to firmware version 2.74.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2010/a00875.php
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201008-0257",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 to 2.73"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 to 2.73"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 to 2.73"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.00"
}
],
"sources": [
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-2363"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "78900"
}
],
"trust": 0.3
},
"cve": "CVE-2010-2363",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2010-000032",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-44968",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2010-2363",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2010-2363",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2010-000032",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201008-364",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-44968",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2010-2363",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------\n\n\nSecunia receives \u0027Frost \u0026 Sullivan\u0027s Global 2010 Customer Value Enhancement Award\n\nSecunia outshines its competitors and receives the Frost \u0026 Sullivan\u2019s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost \u0026 Sullivan concluded:\n\n\"Secunia provides tremendous value for their customers, end-users, and to other security vendors.\"\n\nRead more: http://secunia.com/blog/117/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers IPv6 Unicast RPF Spoofing Vulnerability\n\nSECUNIA ADVISORY ID:\nSA41088\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41088/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nRELEASE DATE:\n2010-08-26\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41088/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41088/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL routers, which can be\nexploited by malicious people to conduct spoofing attacks. \n\nThe vulnerability is reported in the following products:\n* SEIL/X1 firmware version 1.00 through 2.73\n* SEIL/X2 firmware version 1.00 through 2.73\n* SEIL/B1 firmware version 1.00 through 2.73\n\nSOLUTION:\nUpgrade to firmware version 2.74. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/seilseries/security/2010/a00875.php\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "PACKETSTORM",
"id": "93040"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2010-2363",
"trust": 2.9
},
{
"db": "JVN",
"id": "JVN12683004",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "41088",
"trust": 1.3
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#12683004",
"trust": 0.6
},
{
"db": "BID",
"id": "78900",
"trust": 0.5
},
{
"db": "XF",
"id": "61382",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-44968",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2010-2363",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "93040",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "PACKETSTORM",
"id": "93040"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"id": "VAR-201008-0257",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:22:29.688000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00875",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://jvn.jp/en/jp/jvn12683004/index.html"
},
{
"trust": 2.2,
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
},
{
"trust": 1.8,
"url": "http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000032.html"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/41088"
},
{
"trust": 1.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2363"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2363"
},
{
"trust": 0.3,
"url": "http://xforce.iss.net/xforce/xfdb/61382"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/264.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/78900"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/41088/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/41088/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/blog/117/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "PACKETSTORM",
"id": "93040"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "PACKETSTORM",
"id": "93040"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-08-30T00:00:00",
"db": "VULHUB",
"id": "VHN-44968"
},
{
"date": "2010-08-30T00:00:00",
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"date": "2010-08-30T00:00:00",
"db": "BID",
"id": "78900"
},
{
"date": "2010-08-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"date": "2010-08-25T05:39:54",
"db": "PACKETSTORM",
"id": "93040"
},
{
"date": "2010-08-30T20:00:01.983000",
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"date": "2010-08-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-44968"
},
{
"date": "2017-08-17T00:00:00",
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"date": "2010-08-30T00:00:00",
"db": "BID",
"id": "78900"
},
{
"date": "2010-08-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"date": "2017-08-17T01:32:43.103000",
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"date": "2010-09-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
],
"trust": 0.6
}
}
FKIE_CVE-2014-2004
Vulnerability from fkie_nvd - Published: 2014-06-16 14:55 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "2D60C9B1-33AE-42B8-9521-20AF2351458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C201F596-859B-4C9D-9043-5C82D75ADF93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "834A5422-67BC-4036-A007-60B41956D199",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A637B6-3EC2-4BD8-89B4-3B259140412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "73A44489-81E0-49F1-91EB-1E3CAA780313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32543A8B-CD82-4B84-A4C2-EC4B18A0DAC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "01A2F64E-4C0E-47F8-B314-3A4B101F23B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C5DA19-0661-4735-AE91-E65EB59850EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.82:*:*:*:*:*:*:*",
"matchCriteriaId": "85398E2A-B6E0-40ED-855F-7EFEFE350B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "BE60DCDF-C5A6-4BC8-9E5A-B2DA63517CCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B02919BA-9D40-4882-A2E0-BE02EBF18862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "F6DEE92C-0381-479B-8EA6-DB6EEE216764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A57950-024E-4F86-ADC5-6ED33966CD73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "F0073D30-C4C7-4E12-A53D-4116496E3677",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA8CA61-D4F6-4A11-87FC-E0898C73A04E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "11EAE136-B926-4FFE-B799-C13356F1848F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8330E7-F52F-4C12-A07F-FBD3C01D382A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "0E686229-8BBE-48C0-B953-DF6B82A2B2D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB1D5F4-986D-4D3F-800B-2BDD2EDE7DC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE74E12-BDED-4459-89F9-18B0D621BF0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C09830F5-3D79-455E-B211-A7B46318C83C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "2B80FBBD-1972-451A-98F2-80318DD37FF5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
},
{
"lang": "es",
"value": "PPP Access Concentrator (PPPAC) en routers SEIL SEIL/x86 1.00 hasta 3.10, routers SEIL/X1 1.00 hasta 4.50, routers SEIL/X2 1.00 hasta 4.50, routers SEIL/B1 1.00 hasta 4.50, routers SEIL/Turbo 1.80 hasta 2.17 y routers SEIL/neu 2FE Plus 1.80 hasta 2.17 permite a atacantes remotos causar una denegaci\u00f3n de servicio (terminaci\u00f3n de sesi\u00f3n o interrupci\u00f3n de concentrador) a trav\u00e9s de un paquete TCP manipulado."
}
],
"id": "CVE-2014-2004",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-16T14:55:05.893",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.seil.jp/support/security/a01443.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4708
Vulnerability from fkie_nvd - Published: 2013-10-01 17:55 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\%2fx1_firmware | 1.00 | |
| iij | seil\%2fx1_firmware | 4.30 | |
| iij | seil\/x1 | * | |
| iij | seil\%2fb1_firmware | 1.00 | |
| iij | seil\%2fb1_firmware | 4.30 | |
| iij | seil\/b1 | * | |
| iij | seil\%2fx2_firmware | 1.00 | |
| iij | seil\%2fx2_firmware | 4.30 | |
| iij | seil\/x2 | * | |
| iij | seil\%2fx86_firmware | 1.00 | |
| iij | seil\%2fx86_firmware | 2.80 | |
| iij | seil\/x86 | * | |
| iij | seil\%2fturbo_firmware | 1.80 | |
| iij | seil\%2fturbo_firmware | 2.05 | |
| iij | seil\%2fturbo_firmware | 2.15 | |
| iij | seil\/turbo | * | |
| iij | seil\%2fneu_2fe_plus_firmware | 1.80 | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.05 | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.15 | |
| iij | seil\/neu_2fe_plus | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA8CA61-D4F6-4A11-87FC-E0898C73A04E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB1D5F4-986D-4D3F-800B-2BDD2EDE7DC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B02919BA-9D40-4882-A2E0-BE02EBF18862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A57950-024E-4F86-ADC5-6ED33966CD73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "01A2F64E-4C0E-47F8-B314-3A4B101F23B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "2D60C9B1-33AE-42B8-9521-20AF2351458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A637B6-3EC2-4BD8-89B4-3B259140412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
},
{
"lang": "es",
"value": "El PPP Access Concentrator (PPPAC) en Internet Initiative Japan Inc. SEIL/x86 1.00 hasta la versi\u00f3n 2.80, SEIL/X1 1.00 hasta 4.30, SEIL/X2 1.00 hasta 4.30, SEIL/B1 1.00 hasta 4.30, SEIL/Turbo 1.80 hasta 2.15, y SEIL/neu 2FE Plus 1.80 hasta la versi\u00f3n 2.15 genera n\u00fameros aleatorios predecibles, lo que permite a atacantes remotos evadir la autenticaci\u00f3n RADIUS interceptando el tr\u00e1fico de RADIUS."
}
],
"id": "CVE-2013-4708",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-01T17:55:03.647",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://osvdb.org/97619"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/97619"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01388.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4709
Vulnerability from fkie_nvd - Published: 2013-09-20 15:26 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil_x2_firmware | 1.00 | |
| iij | seil_x2_firmware | 4.31 | |
| iij | seil\/x2 | * | |
| iij | seil\%2fturbo_firmware | 2.05 | |
| iij | seil\%2fturbo_firmware | 2.15 | |
| iij | seil\/turbo | * | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.05 | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.15 | |
| iij | seil\/neu_2fe_plus | * | |
| iij | seil\%2fb1_firmware | 1.00 | |
| iij | seil\%2fb1_firmware | 4.31 | |
| iij | seil\/b1 | * | |
| iij | seil\%2fx86_firmware | 1.00 | |
| iij | seil\%2fx86_firmware | 2.81 | |
| iij | seil\/x86 | * | |
| iij | seil\%2fx1_firmware | 1.00 | |
| iij | seil\%2fx1_firmware | 4.31 | |
| iij | seil\/x1 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "63D5F850-2020-4951-9D8A-1B50E4F8541C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x2_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "15FD9501-0A71-4060-898B-5D2CC101DE1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE74E12-BDED-4459-89F9-18B0D621BF0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C5DA19-0661-4735-AE91-E65EB59850EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "11EAE136-B926-4FFE-B799-C13356F1848F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en PPP Access Concentrator (PPPAC) en SEIL/x86 con firmware anterior a 2.82, SEIL/X1 con firmware anterior a 4.32, SEIL/X2 con firmware anterior a 4.32, SEIL/B1 con firmware anterior a 4.32, SEIL/Turbo con firmware anterior a 2.16, y SEIL/neu 2FE Plus con firmware anterior a 2.16 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un mensaje L2PT manipulado."
}
],
"id": "CVE-2013-4709",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-09-20T15:26:04.230",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01396.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0454
Vulnerability from fkie_nvd - Published: 2011-03-01 23:00 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "43F0BE07-FC42-4AB1-A553-1B254CC57D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1DADC38F-D530-49FC-A834-3BBC5FF71C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F76EDD89-9C58-40BE-B7AE-72E82D051641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "71B53A2B-FF57-42B1-957B-E01CC8DE087B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0D8323-9921-415C-B47C-49A947068F68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "EEBE6E5A-691F-46EF-B999-18ED949BF2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "11181F82-4A35-43AD-838E-E07092DF8652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9E04C4-EA46-4F14-A60B-12CAD9E98485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "1108097E-7B13-41A8-A6FC-0F958BFEB94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB61B92-399A-45AD-A2EB-886F01DE57D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0928B5-60AB-4F2B-BF12-EEFF0CC38CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "30C0244F-E26B-45E6-A14F-0482B22C4E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4FF3BD-1659-4582-AF3E-385829001579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F107CD-7985-4529-B9CB-F15C9EE80975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5C947580-1489-4B27-A740-1A5853170E89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "6C2D29BB-DAEC-4D24-AA79-E7F136D37B0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0B23BF51-78E0-46B7-8288-16EB6C1D210C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "953C86E4-3E0F-4A75-BD27-EF8BE4F48894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D7717A-A3E4-45A8-A774-3C2855267FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A7500641-D607-4221-ADA2-CBCC338F22A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "21A290E5-32F5-42AE-BDE8-C92B84A44D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC7F97-3208-43EE-B931-A28CD9A3515F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3C03EE30-DC89-4926-A1FF-F878B4F9E205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "90546F95-8BA1-4F13-86F4-91F797528281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A47FE3-A7E3-41FF-81B2-A41CCB776924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "8B75E486-B21A-4155-A4F8-155CD3A2EB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "35A5F2AA-23C4-43D4-B355-A9971503E3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA78DB-5273-48F5-9350-EABAEE8FD79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "E805B146-572E-466E-BF0B-6B53970A72EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "86AAEE2F-8D63-4167-A6C8-DAD2F235015D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "C83696CE-91F3-4559-B16A-D1CF1C915515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF4C61B-393E-44E4-9404-BC331C8E8729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4E913E-1E8D-439B-8B77-35A54E42EC98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "C75C2643-7F2A-4C34-94A0-DCB60399EF07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8E0B95-CFD0-4501-B98E-FC05113F7022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "9F916DA4-79A9-4523-907C-812E3FDF69FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9E82EF-2A12-4A7F-8559-D8D2147FB74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "ADEE64C1-72A3-42FF-A13F-7F3E5F41F53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC574B6-B448-4A51-B5A0-2F521205D4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "71A0080D-3532-46E2-AC7D-F3E3E73622D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "59204C16-8DC1-4BA0-9F73-560CC6D0E37B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A420F017-83DC-4029-A0F8-F50ED600CEA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2923D4A5-FD10-4846-B2F5-93C64DEB081E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07EB84-D033-423B-AD53-D7B47DC508C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CB31A5D1-6219-4E7D-965A-65C885C71C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4383E0DF-E0D2-4E59-8053-CFD57F4C11C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "25B9C033-965D-420F-8F71-C650592D5AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCB5982-5ECF-471C-8731-59AB4784055F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF907907-1E85-4F85-84ED-0DB73466186F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "429DBDFD-C32D-4888-BC36-FCE5896FC963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "809E64CE-504D-49BB-8C76-09D95F814893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC22870-8A4A-483E-AA38-325E1564E4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "07952D84-10F6-46D0-B896-89401F063888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB8C1C6-D47D-4A85-8997-9E356688DA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "07AB01A2-0CC3-49E6-B1A1-FF1BD918019E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "38FA01CD-625E-4DE4-8898-725AF4D8D2B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "88B39BDF-A579-4C67-98E8-C017F426076C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "6285D504-1960-42B4-8F7B-1AEDEB9AE865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F9FFA1-A224-473B-9827-7F5F40A20837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F86FC7-A7B2-4A58-9CDA-3056CE4C9AD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "35160F7C-5804-4A43-96F8-31456EED7DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "486D5372-371D-4E43-B2AA-2E7236C8BDB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "73301872-EFC2-4E08-B166-ECBBEC6DB310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C2C21D-8DEA-4BD4-B116-875DAF8F9AB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "CB84E030-ADCF-4A17-878C-BE6FD000DA18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "D157BDC2-5ABA-4B94-B497-7814656FB4DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "A57A7B71-F867-4229-96C5-F92DA246965D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8B532D-A45C-4111-A251-2BD9130DA95A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "F235CD04-35C6-4682-A106-843CF8E46110",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A112F5-13F8-462E-87CF-AB2CC460CEF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF5549D-33D5-420A-9B3E-6DF9312C4E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "37B08D35-81CD-40C1-B2D9-84D6E59CF0C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "A60CE6E6-9534-449B-A94A-BEBA13098168",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "11E4367A-457C-4B7F-9BE8-53E3D2B49619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA6C92F-E66D-452C-9270-6DFC4D7F1F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "F116BC45-BE30-4792-9608-EFB81C98474D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE8DDF0-7669-45BD-820C-81FC8E13155F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "601CA34B-CAC4-4ED9-8ACB-5A33CC094043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "4D045157-F49D-43B5-B72E-21E04169F6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F74F4DE-5345-4143-8491-E7309E382F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2A875FD5-EB5C-4656-AB9D-18C4B8292603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "2B674EC4-814A-47FD-AA07-F2771A69E8FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E3472F4F-8EB5-4FB1-A4D8-906C12881A19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "37EF3613-AC50-4247-944C-C458665586EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "0956BF1C-0002-496A-A016-6EB39241A6BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "6E1F0CCF-9850-4947-AB9B-B6B1F9B062D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1465E3-0262-4D2F-BE9F-283975E2333A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "B3165577-0B87-432C-9358-0AABDC43962F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "218A23E8-73D4-455C-9394-6815393FF16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "96AD6D79-11A9-495B-A2B5-72FB4F038285",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "F8670AD0-35C3-4438-A181-7521EC847A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC07A9F-315F-4568-BFE8-F0059DE1F9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "940393EB-8F83-4F7C-89B3-ACD8408DB042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "7020FE3C-4828-4A93-AB2A-468E560D8B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "453CDEAE-AC98-43E0-A911-81851218627C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "65AB86F2-B376-485F-B5B0-320F6ADA07BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C827210B-2416-4359-9332-E90FF4F21677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E12BA97C-1DCB-46D2-B0CB-1ACE81075706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E77F9AD8-D3A9-4F54-9FE4-92BBD2F46AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA6A477-7672-47EB-B87C-E1C6AAF50F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "88FE1585-45C4-429F-928A-C046ABCA9017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA2BCF0-C05B-41C5-96B5-C95DD436F8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "1869AC1F-51B0-4526-8EDA-DEF06C367451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF07485-398B-47D4-862A-95F7E5E290E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE93F86-E9A8-4998-BBF3-FF7EDD77B97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "69D2A024-111B-4277-8C98-65A68D08EBD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "38F6905E-F264-4646-A242-6594431F14A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0773B6A6-ABAD-44A6-B603-8223A6DFBB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "47E78806-7F68-4544-ADAE-C406320BE9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "1D036A01-44D0-4765-9A9A-FF85AF6F2288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "606B52C7-1B72-457E-88F8-F640D9680561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "1171554F-CD60-4828-B09F-067F15970A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "0D887445-7CD6-4F2A-BC42-CF695A68269E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "41F891F4-BB36-4B92-B87D-261CECA4DD15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2696E1-2EE9-4020-857A-2F548FB61D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87A0AD7B-23AC-4292-9572-1C3574327C95",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en el concentrador de acceso PPP (\"PPP Access Concentrator\" o PPPAC) en SEIL/x86 con firmware 1.00 hasta 1.61, SEIL/B1 con firmware 1.00 hasta 3.11, SEIL/X1 con firmware 1.00 hasta 3.11, SEIL/X2 con firmware 1.00 hasta 3.11, SEIL/Turbo con firmware 1.80 hasta 2.10, y SEIL/neu 2FE Plus con firmware 1.80 hasta 2.10 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete PPPoE."
}
],
"id": "CVE-2011-0454",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-03-01T23:00:02.800",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43494"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4293
Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\/x1_firmware | 2.30 | |
| iij | seil\/x1_firmware | 2.40 | |
| iij | seil\/x1_firmware | 2.41 | |
| iij | seil\/x1_firmware | 2.42 | |
| iij | seil\/x1_firmware | 2.50 | |
| iij | seil\/x1_firmware | 2.51 | |
| iij | seil\/x1 | * | |
| iij | seil\/b1_firmware | 2.30 | |
| iij | seil\/b1_firmware | 2.40 | |
| iij | seil\/b1_firmware | 2.41 | |
| iij | seil\/b1_firmware | 2.42 | |
| iij | seil\/b1_firmware | 2.50 | |
| iij | seil\/b1_firmware | 2.51 | |
| iij | seil\/b1 | * | |
| iij | seil\/x2_firmware | 2.30 | |
| iij | seil\/x2_firmware | 2.40 | |
| iij | seil\/x2_firmware | 2.41 | |
| iij | seil\/x2_firmware | 2.42 | |
| iij | seil\/x2_firmware | 2.50 | |
| iij | seil\/x2_firmware | 2.51 | |
| iij | seil\/x2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
},
{
"lang": "es",
"value": "El firmware Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 desde v2.30 hasta v2.51, cuando NAT esta activado, permite a atacantes remotos producir una denegaci\u00f3n de servicio (reinicio de sistema) a trav\u00e9s de paquetes GRE manipulados."
}
],
"id": "CVE-2009-4293",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-12-10T23:30:00.420",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/59361"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/59361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4292
Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\/x1_firmware | 2.40 | |
| iij | seil\/x1_firmware | 2.41 | |
| iij | seil\/x1_firmware | 2.42 | |
| iij | seil\/x1_firmware | 2.50 | |
| iij | seil\/x1_firmware | 2.51 | |
| iij | seil\/x1 | * | |
| iij | seil\/b1_firmware | 2.40 | |
| iij | seil\/b1_firmware | 2.41 | |
| iij | seil\/b1_firmware | 2.42 | |
| iij | seil\/b1_firmware | 2.50 | |
| iij | seil\/b1_firmware | 2.51 | |
| iij | seil\/b1 | * | |
| iij | seil\/x2_firmware | 2.40 | |
| iij | seil\/x2_firmware | 2.41 | |
| iij | seil\/x2_firmware | 2.42 | |
| iij | seil\/x2_firmware | 2.50 | |
| iij | seil\/x2_firmware | 2.51 | |
| iij | seil\/x2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n de filtrado de URL en el firmware Internet Initiative Japan SEIL/X1, SEIL/X2, y SEIL/B1 desde la v2.40 hasta la v2.51 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar."
}
],
"id": "CVE-2009-4292",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-12-10T23:30:00.390",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/59362"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/59362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-2004 (GCVE-0-2014-2004)
Vulnerability from cvelistv5 – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.188Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-2004",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01443.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-2004",
"datePublished": "2014-06-16T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4708 (GCVE-0-2013-4708)
Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-10-01T17:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4708",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01388.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"refsource": "OSVDB",
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4708",
"datePublished": "2013-10-01T17:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-17T01:15:57.609Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4709 (GCVE-0-2013-4709)
Vulnerability from cvelistv5 – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-20T15:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#43152129",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"name": "http://www.seil.jp/support/security/a01396.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4709",
"datePublished": "2013-09-20T15:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-16T17:58:50.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0454 (GCVE-0-2011-0454)
Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2011-000014",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"name": "http://www.seil.jp/support/security/a01001.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0454",
"datePublished": "2011-03-01T22:00:00",
"dateReserved": "2011-01-14T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4292 (GCVE-0-2009-4292)
Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4292",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-url-bo(54051)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"refsource": "OSVDB",
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4292",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4293 (GCVE-0-2009-4293)
Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4293",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"refsource": "OSVDB",
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4293",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2004 (GCVE-0-2014-2004)
Vulnerability from nvd – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.188Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-2004",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01443.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-2004",
"datePublished": "2014-06-16T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4708 (GCVE-0-2013-4708)
Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-10-01T17:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4708",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01388.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"refsource": "OSVDB",
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4708",
"datePublished": "2013-10-01T17:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-17T01:15:57.609Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4709 (GCVE-0-2013-4709)
Vulnerability from nvd – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-20T15:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#43152129",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"name": "http://www.seil.jp/support/security/a01396.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4709",
"datePublished": "2013-09-20T15:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-16T17:58:50.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0454 (GCVE-0-2011-0454)
Vulnerability from nvd – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2011-000014",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"name": "http://www.seil.jp/support/security/a01001.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0454",
"datePublished": "2011-03-01T22:00:00",
"dateReserved": "2011-01-14T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4292 (GCVE-0-2009-4292)
Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4292",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-url-bo(54051)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"refsource": "OSVDB",
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4292",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4293 (GCVE-0-2009-4293)
Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4293",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"refsource": "OSVDB",
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4293",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}