Search criteria
6 vulnerabilities found for x2 by seil
VAR-201709-0222
Vulnerability from variot - Updated: 2023-12-18 13:43SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet. The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. The following products and versions are affected: Internet Initiative Japan SEIL/X version 4.60 to 5.72; SEIL/B1 version 4.60 to 5.72; SEIL/x86 version 3.20 to 5.72; SEIL/BPV4 version 5.00 to 5.72
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201709-0222",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "bpv 4",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "5.00"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "5.72"
},
{
"model": "x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.20"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "5.72"
},
{
"model": "x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "5.72"
},
{
"model": "b1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "4.60"
},
{
"model": "bpv 4",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "5.72"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "4.60"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "4.60"
},
{
"model": "b1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "5.72"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "4.60 to 5.72"
},
{
"model": "seil/bpv4",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "5.00 to 5.72"
},
{
"model": "seil/x",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "4.60 to 5.72"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.20 to 5.72"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:5.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:b1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:bpv_4_firmware:5.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:bpv_4_firmware:5.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:bpv_4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x1_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:x1_firmware:5.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:x1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x2_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:x2_firmware:5.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:x2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:x86_fuji_firmware:5.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:x86_fuji:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-10856"
}
]
},
"cve": "CVE-2017-10856",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2017-000222",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-101220",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2017-000222",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-10856",
"trust": 1.0,
"value": "LOW"
},
{
"author": "IPA",
"id": "JVNDB-2017-000222",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201709-781",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-101220",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-101220"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet. The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. The following products and versions are affected: Internet Initiative Japan SEIL/X version 4.60 to 5.72; SEIL/B1 version 4.60 to 5.72; SEIL/x86 version 3.20 to 5.72; SEIL/BPV4 version 5.00 to 5.72",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "VULHUB",
"id": "VHN-101220"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-10856",
"trust": 2.5
},
{
"db": "JVN",
"id": "JVN76692689",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000222",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-101220",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-101220"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"id": "VAR-201709-0222",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-101220"
}
],
"trust": 0.52368742
},
"last_update_date": "2023-12-18T13:43:59.178000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc.",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01811.html"
},
{
"title": "Multiple Internet Initiative Japan SEIL Repair measures for series router security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74953"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-101220"
},
{
"db": "NVD",
"id": "CVE-2017-10856"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://jvn.jp/en/jp/jvn76692689/index.html"
},
{
"trust": 1.7,
"url": "http://www.seil.jp/support/security/a01811.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10856"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-10856"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-101220"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-101220"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-09-15T00:00:00",
"db": "VULHUB",
"id": "VHN-101220"
},
{
"date": "2017-09-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"date": "2017-09-15T17:29:00.383000",
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"date": "2017-09-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-101220"
},
{
"date": "2018-02-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-000222"
},
{
"date": "2019-10-03T00:03:26.223000",
"db": "NVD",
"id": "CVE-2017-10856"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000222"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-781"
}
],
"trust": 0.6
}
}
VAR-201704-0902
Vulnerability from variot - Updated: 2023-12-18 13:19SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets. The DNS forwarder, the PPP Access Concentrator (L2TP) and the Measure(iPerf server) function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. The following products and versions are affected: SEIL/x86 Fuji versions 1.70 to 5.62, SEIL/BPV4 versions 5.00 to 5.62, SEIL/X1 versions 1.30 to 5.62, SEIL/X2 versions 1.30 to 5.62, SEIL/B1 versions 1.00 to 5.62
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0902",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": null
},
{
"model": "x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": null
},
{
"model": "b1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": null
},
{
"model": "bpv 4",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": null
},
{
"model": "x1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 5.62"
},
{
"model": "seil/bpv4",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "5.00 to 5.62"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.30 to 5.62"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.30 to 5.62"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.70 to 5.62"
},
{
"model": "seil/b1",
"scope": "gte",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.00,\u003c=5.62"
},
{
"model": "seil/bpv4",
"scope": "gte",
"trust": 0.6,
"vendor": "internet initiative",
"version": "5.00,\u003c=5.62"
},
{
"model": "seil/x1",
"scope": "gte",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.30,\u003c=5.62"
},
{
"model": "seil/x2",
"scope": "gte",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.30,\u003c=5.62"
},
{
"model": "seil/x86 fuji",
"scope": "gte",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.70,\u003c=5.62"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x86_fuji_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:x86_fuji:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:bpv_4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:bpv_4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x1_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:x1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:x2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:seil:b1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-2153"
}
]
},
"cve": "CVE-2017-2153",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2017-000071",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-07494",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-110356",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2017-000071",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-2153",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2017-000071",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-07494",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201705-095",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-110356",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "VULHUB",
"id": "VHN-110356"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets. The DNS forwarder, the PPP Access Concentrator (L2TP) and the Measure(iPerf server) function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. The following products and versions are affected: SEIL/x86 Fuji versions 1.70 to 5.62, SEIL/BPV4 versions 5.00 to 5.62, SEIL/X1 versions 1.30 to 5.62, SEIL/X2 versions 1.30 to 5.62, SEIL/B1 versions 1.00 to 5.62",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "VULHUB",
"id": "VHN-110356"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-2153",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVN86171513",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-07494",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-110356",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "VULHUB",
"id": "VHN-110356"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"id": "VAR-201704-0902",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "VULHUB",
"id": "VHN-110356"
}
],
"trust": 1.162307692
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
}
]
},
"last_update_date": "2023-12-18T13:19:31.815000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Information from Internet Initiative Japan Inc.",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01783.html"
},
{
"title": "Patch for Multiple Internet Initiative Japan Product Denial of Service Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/94414"
},
{
"title": "Multiple Internet Initiative Japan Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69770"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110356"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "NVD",
"id": "CVE-2017-2153"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://jvn.jp/en/jp/jvn86171513/index.html"
},
{
"trust": 1.7,
"url": "http://www.seil.jp/support/security/a01783.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2153"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2153"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110356"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"db": "VULHUB",
"id": "VHN-110356"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"date": "2017-04-28T00:00:00",
"db": "VULHUB",
"id": "VHN-110356"
},
{
"date": "2017-04-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"date": "2017-04-28T16:59:02.060000",
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"date": "2017-04-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-05-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-07494"
},
{
"date": "2017-05-11T00:00:00",
"db": "VULHUB",
"id": "VHN-110356"
},
{
"date": "2017-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-000071"
},
{
"date": "2017-05-11T15:19:27.933000",
"db": "NVD",
"id": "CVE-2017-2153"
},
{
"date": "2017-05-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000071"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-095"
}
],
"trust": 0.6
}
}
VAR-201206-0410
Vulnerability from variot - Updated: 2023-12-18 12:31SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. SEIL series contain an issue where access permissions are not restricted. SEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.An attacker that can access the product's HTTP proxy may bypass restrictions such as the URL filter. The SEIL Router is a router from Japan's SEIL vendors. A security vulnerability exists in the SEIL Router that allows malicious users to bypass some security restrictions. There is an error in the HTTP-Proxy/Gateway function provided by the router. To successfully exploit the vulnerability, you need to set HTTP-Proxy and enable \"Application-Gateway\". SEIL routers are routers produced by SEIL manufacturers in Japan. A successful attack requires setting up an HTTP proxy and enabling an "Application Gateway". ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: SEIL Routers HTTP-Proxy/Gateway Functionality Security Bypass Vulnerability
SECUNIA ADVISORY ID: SA49365
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49365/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49365
RELEASE DATE: 2012-06-06
DISCUSS ADVISORY: http://secunia.com/advisories/49365/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49365/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49365
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an error within the HTTP-Proxy/Gateway functionality and can be exploited to e.g.
The vulnerability is reported in the following products and versions: * SEIL/x86 firmware versions 1.00 through 2.35. * SEIL/X1 firmware versions 2.30 through 3.75. * SEIL/X2 firmware versions 2.30 through 3.75. * SEIL/B1 firmware versions 2.30 through 3.75.
SOLUTION: Update to a fixed version.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: SEIL: http://www.seil.jp/support/security/a01232.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201206-0410",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.75"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.71"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.70"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.60"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.51"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.50"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.41"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.40"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.31"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.30"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.21"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.20"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.13"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.12"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.11"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.10"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.02"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "3.01"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.75"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.74"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.73"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.72"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.70"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.63"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.62"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.61"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.60"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.52"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.51"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.50"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.42"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.41"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.40"
},
{
"model": "b1",
"scope": "eq",
"trust": 2.6,
"vendor": "seil",
"version": "2.30"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.30"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.50"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.70"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.60"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.31"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.51"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.41"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.40"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.31"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.6,
"vendor": "seil",
"version": "3.40"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.40"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.50"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.41"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.13"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.63"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.74"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.61"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.75"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.11"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.74"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.61"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.70"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.75"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.60"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.01"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.11"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.62"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.30"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.10"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.60"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.01"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.60"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.41"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.73"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.52"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.51"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.02"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.62"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.70"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.42"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.21"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.40"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.73"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.51"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.02"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.70"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.42"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.63"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.12"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.21"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.72"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.30"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.12"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.50"
},
{
"model": "x86",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "1.00"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.72"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.30"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.10"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.71"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.20"
},
{
"model": "x86",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "1.61"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.75"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.71"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.41"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.51"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.50"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.20"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.52"
},
{
"model": "x2",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "3.13"
},
{
"model": "x1",
"scope": "eq",
"trust": 1.0,
"vendor": "seil",
"version": "2.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.30 to 3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.30 to 3.75"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.30 to 3.75"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 2.35"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.75"
},
{
"model": "",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x861.61"
},
{
"model": "",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x861.00"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.75"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.71"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.70"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.60"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.51"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.50"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.41"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.40"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.31"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.30"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.21"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.13"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.12"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.11"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.02"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x23.01"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.75"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.74"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.73"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.72"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.70"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.63"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.62"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.61"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.60"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.52"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.51"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.50"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.42"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.41"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.40"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x22.30"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.75"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.71"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.70"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.60"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.51"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.50"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.41"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.40"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.31"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.30"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.21"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.13"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.12"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.11"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.02"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x13.01"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.75"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.74"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.73"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.72"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.70"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.63"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.62"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.61"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.60"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.52"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.51"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.50"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.42"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.41"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.40"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "x12.30"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "BID",
"id": "78183"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:seil:x86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:x86_firmware:1.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x1:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:x2:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:seil:b1:3.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-2632"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "78183"
}
],
"trust": 0.3
},
"cve": "CVE-2012-2632",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2012-000059",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "VHN-55913",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "CVE-2012-2632",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "LOW",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-2632",
"trust": 1.0,
"value": "LOW"
},
{
"author": "IPA",
"id": "JVNDB-2012-000059",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201206-074",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-55913",
"trust": 0.1,
"value": "LOW"
},
{
"author": "VULMON",
"id": "CVE-2012-2632",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-55913"
},
{
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. SEIL series contain an issue where access permissions are not restricted. SEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.An attacker that can access the product\u0027s HTTP proxy may bypass restrictions such as the URL filter. The SEIL Router is a router from Japan\u0027s SEIL vendors. A security vulnerability exists in the SEIL Router that allows malicious users to bypass some security restrictions. There is an error in the HTTP-Proxy/Gateway function provided by the router. To successfully exploit the vulnerability, you need to set HTTP-Proxy and enable \\\"Application-Gateway\\\". SEIL routers are routers produced by SEIL manufacturers in Japan. A successful attack requires setting up an HTTP proxy and enabling an \"Application Gateway\". ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers HTTP-Proxy/Gateway Functionality Security Bypass\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA49365\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49365/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49365\n\nRELEASE DATE:\n2012-06-06\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49365/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49365/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49365\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL routers, which can be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nThe vulnerability is caused due to an error within the\nHTTP-Proxy/Gateway functionality and can be exploited to e.g. \n\nThe vulnerability is reported in the following products and\nversions:\n* SEIL/x86 firmware versions 1.00 through 2.35. \n* SEIL/X1 firmware versions 2.30 through 3.75. \n* SEIL/X2 firmware versions 2.30 through 3.75. \n* SEIL/B1 firmware versions 2.30 through 3.75. \n\nSOLUTION:\nUpdate to a fixed version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/support/security/a01232.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "BID",
"id": "78183"
},
{
"db": "VULHUB",
"id": "VHN-55913"
},
{
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"db": "PACKETSTORM",
"id": "113468"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-2632",
"trust": 3.5
},
{
"db": "JVN",
"id": "JVN24646833",
"trust": 2.9
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059",
"trust": 2.9
},
{
"db": "CNNVD",
"id": "CNNVD-201206-074",
"trust": 0.7
},
{
"db": "SECUNIA",
"id": "49365",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2012-3059",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "19754",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#24646833",
"trust": 0.6
},
{
"db": "BID",
"id": "78183",
"trust": 0.5
},
{
"db": "VULHUB",
"id": "VHN-55913",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2012-2632",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "113468",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "VULHUB",
"id": "VHN-55913"
},
{
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"db": "BID",
"id": "78183"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "PACKETSTORM",
"id": "113468"
},
{
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"id": "VAR-201206-0410",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "VULHUB",
"id": "VHN-55913"
}
],
"trust": 1.205265565
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
}
]
},
"last_update_date": "2023-12-18T12:31:13.884000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01232.html"
},
{
"title": "SEIL Routers HTTP-Proxy/Gateway feature security bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/17812"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "NVD",
"id": "CVE-2012-2632"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.9,
"url": "http://jvn.jp/en/jp/jvn24646833/index.html"
},
{
"trust": 2.2,
"url": "http://www.seil.jp/support/security/a01232.html"
},
{
"trust": 2.1,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2012-000059"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2632"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2632"
},
{
"trust": 0.6,
"url": "http://www.seil.jp/support/security/a01232.htmlhttp"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/49365"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/19754"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/78183"
},
{
"trust": 0.1,
"url": "http://secunia.com/psi_30_beta_launch"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_intelligence/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/49365/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/49365/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49365"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "VULHUB",
"id": "VHN-55913"
},
{
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"db": "BID",
"id": "78183"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "PACKETSTORM",
"id": "113468"
},
{
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"db": "VULHUB",
"id": "VHN-55913"
},
{
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"db": "BID",
"id": "78183"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"db": "PACKETSTORM",
"id": "113468"
},
{
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-06-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"date": "2012-06-15T00:00:00",
"db": "VULHUB",
"id": "VHN-55913"
},
{
"date": "2012-06-15T00:00:00",
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"date": "2012-06-15T00:00:00",
"db": "BID",
"id": "78183"
},
{
"date": "2012-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"date": "2012-06-11T01:01:35",
"db": "PACKETSTORM",
"id": "113468"
},
{
"date": "2012-06-15T19:55:01.530000",
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"date": "2012-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-06-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-3059"
},
{
"date": "2012-06-18T00:00:00",
"db": "VULHUB",
"id": "VHN-55913"
},
{
"date": "2012-06-18T00:00:00",
"db": "VULMON",
"id": "CVE-2012-2632"
},
{
"date": "2012-06-15T00:00:00",
"db": "BID",
"id": "78183"
},
{
"date": "2012-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-000059"
},
{
"date": "2012-06-18T04:00:00",
"db": "NVD",
"id": "CVE-2012-2632"
},
{
"date": "2012-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201206-074"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL series fail to restrict access permissions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-000059"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Access Validation Error",
"sources": [
{
"db": "BID",
"id": "78183"
}
],
"trust": 0.3
}
}
FKIE_CVE-2012-2632
Vulnerability from fkie_nvd - Published: 2012-06-15 19:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:seil:b1:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "363148D7-E3C5-476F-888C-31692F73FC1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "18A4E9AC-64A9-4585-8889-75B885FA8359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "DF7C5C45-6A98-4DB4-9EC7-6426254CF3AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF3E2DD-A82F-4D27-80AA-57DE4C835E3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "6322C3D4-0B01-474E-9265-35AF4DD516EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "982534C1-C167-4CBB-A56E-513F356CC994",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "41399354-E237-4A2A-9B6B-E63B2662E3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7E15A3-19B8-45E2-B856-8F28CC8C280C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "676E5932-66E5-4FAB-855F-98C5F94A19EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BBC9C8-9C8B-41BD-8BD5-785AC85E1FC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "E07EF718-826D-4AC4-8C86-D44A29AA78AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "0922B5D6-8B08-42AB-BD3E-DE5F38EFF6EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC6A6EB-9D10-4DB4-B9ED-9D00DEF96EBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "374821DE-C0BE-4C68-8B6C-B4B07EF1C46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "05324D90-B60E-40A2-89C4-B5142C066021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "16444EF8-690E-4255-A60E-51D741A8F54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "81EBF6C1-A32B-46DC-9612-C2FE1ABF2627",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B1289B41-28A4-41D3-A092-9F76B1AF6834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EA846901-03C5-48C6-8B03-BD8A4E92E251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2180323C-228A-4C29-927E-C19CEE807F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "712DD1DC-4191-4B68-9B9B-E9BDE5B114CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7224DC-86EB-4876-8D8D-B907165D5EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2D9907-DEA8-445F-9842-538E31DAE63C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "51531ED0-3C36-46D1-9F94-66CA9A98964F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "DB02717B-B93F-4FA6-91ED-18A15ED39529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "B9492E49-4914-4165-8406-CD409B9533A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE3B68F-B637-4FE4-9942-7D6A0EAE3C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "14BED143-E85C-4B8F-8630-35080A911E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "15179500-7194-4663-B601-A99468F8E1F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "D41BECF5-8E3C-464E-B64D-13B61623F83E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "054CDEC9-4F71-415A-98C8-5D36893A4CE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "512BE46D-0D0F-432C-B3D3-F8C43A40945A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.71:*:*:*:*:*:*:*",
"matchCriteriaId": "37BEE6BB-FB53-44C2-B8F6-26028D90ADF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:b1:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "E635DC32-BCA3-40D8-9D53-A216E1A008C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "0353B874-9EFA-41E1-9E53-040A4B778D79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E20904-51CE-48E1-A61D-17E13B85D57D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "E3929172-60B4-4AE0-B80A-290F1F653A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "89392531-4DBE-437E-AF7D-3044CA638E86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "67A26C6C-FF23-41E0-92F0-60BF9E603162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D46283-9927-4116-8B1A-964D90927872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "80694620-F1A1-4EAB-8BEF-89FC2D8AA871",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B32A7AF0-89D1-4636-9DF4-030607B3E6CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "BBBB00AD-5B6A-4C6A-A55D-741509B8F5D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E4BED3-867C-4500-978C-6A1950583C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FCC542-1794-4923-9C0B-448578E40BB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "7E011DE1-BC94-4D2A-99FF-097857A28198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "23537089-9AEE-43A6-868C-6A14A6E1A1A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "EAAE376E-9AAB-4FC4-8330-4BE2656EB38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "22DABCCB-7DD9-48FF-9949-219DB1C86AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "9699AE15-D7A1-4293-87CD-03382DA26B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD32FB4-D5CA-4B8E-9530-582774920E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "BCD232C0-E29A-4E4A-A705-3DDCAE34649D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8908E10F-DDF6-44E4-A93E-9C2DEA9078DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0BCED1B7-5B94-42B6-B831-0A4D0E7C9796",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "107327B7-5C33-4195-959C-CDA39633C4E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C65BE6D4-403C-47B6-8CD3-A88CE8794A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "FA81178C-ECF1-47F1-977A-8DBAD5AD2528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "C507FAEB-9EDD-449A-A22A-754F582023B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "CDF2F222-3FEA-4D66-953D-2FC297C5F6CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "56C8340D-C338-400B-B934-42BAECC9C20E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "AB311CAE-FE73-4FC5-B949-3CAA9D59AFFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "290C1676-56DA-472D-9CAD-5B87760974B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "B1860271-BCDB-448D-8D79-D602FEEC634A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "F956482A-BFEC-4285-B85F-11CA56D97AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD2FCCD-AFED-4C14-9C59-13B123385363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CF63B4-8D0C-40A5-8734-B4988AF8EB4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.71:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1EB48B-CEB3-42CA-B3C0-6F0B06789C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x1:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "AD398D0C-E533-4EE0-A55E-39A868699867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "10FF138F-0A19-4D2F-9C7C-12303A533875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "7860C101-A585-4D26-8D65-0B04154245C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BB8560EC-4A12-4792-BDCB-FA3B8972ED69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B3278B-CA7E-4043-B39B-B6B04605634B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "82D58786-6929-4BAB-91B2-67AECCEC65EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E5D48B-E84A-4759-9F87-0EF60352DE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C96023-017B-4880-93CD-75CA522A6107",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B4267653-44FD-48F2-A838-322295CD2A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "A09D1A20-52F5-4D80-B00A-C1DF369D72B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "05E1455D-22CC-41F4-A5BD-63D91EE5C748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "1925D84D-569A-4BFB-AE03-18FEA3DDD271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D358F4-8B0B-4812-8CDA-74F3731EA501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "C83BE04D-69BC-4F62-A4C1-A65B762476E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD22078-BA28-43A8-8169-F167AD13D905",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "13D20BF2-99E7-4C91-9B51-4E5A5637BED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "4C889686-9E23-44ED-B376-3932803A4057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "E30E7E09-A8BB-442F-8CEA-7BCFBE53D48F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF9EAFE-8906-404C-BBED-0852FCA82B16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "429F239F-B545-4FDF-A332-136693E85996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "88D9D5B9-7048-4933-9657-310FBD1017EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2F59D213-0FC6-4C78-8D72-3030738423A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CC3640-4849-4E4E-A377-93DD27F22184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "623908C5-F1DA-45FB-A3C6-6541E40D13A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "1B400B72-9F2D-43BF-A5BD-63E2B07A4E0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "893FEBFD-CF10-4F27-81C1-8B61462534B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "8850E165-5E32-4F86-B77D-158C8529F252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "9C91A039-AC46-40B8-8106-02ADC3ED44AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "6C392849-4425-42B9-A384-19F0F9EDD958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "A66AF10E-4CC5-4BF1-BA9E-EA89B988C7C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E6BAF2-0C3F-4996-8932-673E21C73CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "8A67D5EA-AEA6-4E29-9B82-499BA54F1319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "55AFD5DD-5EAF-4347-B58C-AC7F376DE90F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.71:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE96121-D65D-4AD4-B779-EBF243507710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:seil:x2:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "2334DAE0-E647-4395-9CB6-5A42A753C9B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "78551AE9-F930-4643-8C63-9A4E6F6AC37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "7D5515A0-59A3-48D3-886B-1A521C87945D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "298A5A1E-0053-4F79-8EC6-CA039172CB9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "9CDDF455-121C-45ED-8E94-D88271513938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "94E0C5E1-DD68-4428-BFAC-AC4713CE1D9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDB2021-AC8E-473C-9DEE-08DDC07B3E4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "00C930C4-B8B4-40A6-BC75-16B1C426EA9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6692E733-DFF0-48FE-95AE-6401F582384C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "4A3BE6F6-F586-49A1-83BD-D45AB1DAE556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "EADA6D53-F16E-4BC5-90DA-0CEED1F14B7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD875EC-54CE-43D2-9642-B8F6AD94FE82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF099B1-85D3-44A6-9CE0-8436B0D80CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "B379EFA5-926B-4E5F-B350-FEB23694244D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "7DCC773D-352E-4B2B-8D0B-9767CA38AD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "87ABDD31-2BCE-44EF-81C6-0155B73EC4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "46139215-3BFF-4869-88AA-BAA3BBDE2F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D2C2B7C7-501A-42FD-BB10-AB5118B10B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "C381A9EF-B6BC-42BB-A5A4-C199670126F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "197B7157-4122-486B-A306-CA60D3F546FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3A707B39-F82A-47EF-A35A-CC87C63A948B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "97D870A8-EA7E-44C7-9277-37413BFA3FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E7133D-17A5-43B3-8E56-9E6082C1CAB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8A75EB6A-FE34-4A15-86F6-7AC14BAC956C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "1DBE0714-B263-4642-8A65-C96FCCDBA3F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A5985C29-C438-45C8-B824-8EFD67FC6B03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "720C7F1E-C3B8-4D73-8470-197074C3D344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "27FFE1C2-EB16-494C-BB15-7CC2799AABF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.41:*:*:*:*:*:*:*",
"matchCriteriaId": "84DECA7D-1D49-4FB5-91C9-2345948544D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA94CE8-D10E-4740-959F-91A0D26BB613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "B97F9240-6168-492B-9357-C750281FC6F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "3A521DC6-D80C-46B3-8C60-364FD411B792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "040FF640-1303-4EDB-A356-9C1C8B23DE64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.71:*:*:*:*:*:*:*",
"matchCriteriaId": "B4537E1A-EC42-47BB-987E-8DA9F57F1FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:b1_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF343DB-D6D0-48A9-9225-56AFA6C632D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:x86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEE5507-E177-41CC-B95F-1003CF795DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:seil:x86_firmware:1.61:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFF5DBD-22A3-4111-A7C8-98AE409B839C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
},
{
"lang": "es",
"value": "Los routers SEIL con firmware SEIL/x86 1.00 hasta la 2.35, SEIL/X1 2.30 hasta la 3.75, SEIL/X2 2.30 hasta la 3.75, y SEIL/B1 2.30 hasta la 3.75, si las funcionalidades http-proxy y application-gateway est\u00e1n activas, no manejan apropiadamente el comando CONNECT, lo que permite a atacantes remotos evitar las restricciones previstas de URL a trav\u00e9s de una sesi\u00f3n TCP."
}
],
"id": "CVE-2012-2632",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-06-15T19:55:01.530",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01232.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01232.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-2632 (GCVE-0-2012-2632)
Vulnerability from cvelistv5 – Published: 2012-06-15 19:00 – Updated: 2024-09-16 17:34- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:31.953Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2012-000059",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"name": "JVN#24646833",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01232.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-06-15T19:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2012-000059",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"name": "JVN#24646833",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01232.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-2632",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2012-000059",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"name": "JVN#24646833",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"name": "http://www.seil.jp/support/security/a01232.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01232.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-2632",
"datePublished": "2012-06-15T19:00:00Z",
"dateReserved": "2012-05-14T00:00:00Z",
"dateUpdated": "2024-09-16T17:34:25.260Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2632 (GCVE-0-2012-2632)
Vulnerability from nvd – Published: 2012-06-15 19:00 – Updated: 2024-09-16 17:34- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:31.953Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2012-000059",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"name": "JVN#24646833",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01232.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-06-15T19:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2012-000059",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"name": "JVN#24646833",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01232.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-2632",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2012-000059",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
},
{
"name": "JVN#24646833",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN24646833/index.html"
},
{
"name": "http://www.seil.jp/support/security/a01232.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01232.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-2632",
"datePublished": "2012-06-15T19:00:00Z",
"dateReserved": "2012-05-14T00:00:00Z",
"dateUpdated": "2024-09-16T17:34:25.260Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}