Vulnerabilites related to supermicro - x8dtu-6tf\+
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F574AF-FC1C-453C-A8FB-C11F42ED8E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B966320-9479-48D4-9C08-0C5BC655588D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "502A47AC-064C-49FE-AC9C-50D0C1B62DA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "797EFABC-8823-4B42-8FA1-A26CF406166B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*", "matchCriteriaId": "978262CA-7C6A-4F3D-9480-A08230E30EB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F113C555-5E90-4458-9C30-79C3EBB8E917", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8551A73-5B20-44D5-BC9C-11F18F40C055", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEBE2CB-7349-4A9A-838F-7E4220BF74E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*", "matchCriteriaId": "39DEF117-ED63-42DF-A4E6-0A019BE82968", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCAA5397-D28D-4817-AC21-F0D0DEA95489", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CCF563E-6A20-4F99-80FB-1BED5149E8C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB097280-76E6-4DBE-BD2F-DDE3C9DBD734", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "36ACA455-CB46-4B0E-9F5B-86508907323C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A159DCC-D2F7-4409-B842-027100794679", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A34630C1-5B6A-46BD-BD0A-A1DED08003E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A5024C-F341-4DD6-ABCF-B9259937732C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "C09A30A7-C88C-4365-8D24-BFAB1EEF53F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D060E9B-0967-49E1-958B-B4557BC2634A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "6596C3C0-9DAC-43AF-9185-51E16096BAEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05C4617-F33D-40F0-8271-C4FE1578BAF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF4ECC2-7EF8-4150-AB45-D30B88BE884C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "61EB064B-5A03-4D54-BB55-15AA35B44668", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8C8686-ABA2-466F-8309-D483F128CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82B90F8-3E33-47E5-8D65-92BF39E7091D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "35FD83D9-1F28-454F-9221-9CF69F8730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "47EA3F5D-38B1-4D3F-BA3B-C03598124119", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD772BE-13CE-48F7-A24F-28825060561E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38C112C-52D0-4D29-8FF6-298AD01B981C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D46200-C176-49FE-AB45-CD1706355A56", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "95798443-906A-445B-8CB7-9FAE8223AAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "82286D8E-632D-440A-BF94-94331B195222", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D640B1-0DED-4CF0-AD43-AFFEBE953157", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "736B9BD0-E764-4321-A1A5-C8875147F701", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0490EB39-70EA-494C-855C-6698B65421FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB343D9-AA39-4837-AE84-CF8EC50B758A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "65D600FF-CA39-40C0-8535-E39971E5C34A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E690BCC-685E-4A3C-9F30-C0429B6591FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "672B902B-C4B1-4E10-AE16-34C562029D1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BE8D56-4810-470E-B284-CCD1D92736F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "45003169-49AF-4CA0-8E44-0137476D0352", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F84B957-6385-4533-B8B0-B252B695721A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*", "matchCriteriaId": "A977F207-190D-48ED-AC31-A9D500114F2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F77C1AD-12C9-492B-82B9-A5469182FEEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "B111BB68-F4D3-471D-8B99-EE4AED27974A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*", "matchCriteriaId": "39C2D975-2AEF-4083-820D-356D846DDC59", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6499489-EFEA-4C8E-B5F5-56F92DF25F2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03A480E-8EE9-4040-B1C6-3E60EBD010BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB68F879-2E55-4D12-8259-13C37004FB33", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5D8C2C-683C-4670-9878-B879AAABD54D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F818CA-1CB3-48B2-BED0-99C09A6F8259", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4401E676-3E1D-431E-ABAF-89BC9CAC64D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C27D83-5E57-4B7B-B765-B41AAA004C74", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1E2A1-71CA-48F0-8A91-E0AD896D4106", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "77777CE0-0095-4318-A194-D14CF4D699CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC43CCB5-7842-4BD3-B2DB-597815E129CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "767854D0-2DE0-4628-B6D7-18161F471718", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2EF8A1A-3BBC-44DB-8469-14B71495E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4102B60-86D2-42AC-86A9-0F690CDA0970", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "097802C6-25DA-4D55-84E7-10B4E5CC59F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "56C269C6-B569-493E-8D29-CE16C03CCA4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA6459A-758D-46D4-89F4-E4DE71FF48E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0853B35-F437-41D3-8126-0C51A788CDCA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*", "matchCriteriaId": "08F263B5-4723-4153-A751-78F539A3C64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B9DE20-58F4-4EED-950F-FF8E07313D9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFE8879B-78B1-4372-BD32-C09B6EE083DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "F26B68A6-66A9-4272-B6AE-ADCF0DE1733E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "C56CCB73-97FB-4F81-8D9E-2F441364AD22", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "D77595EF-70F4-41DD-85CF-D866AA4B3988", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB6BEBA8-B432-45BB-8756-AFC6123404B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E98461CD-D04C-4C72-9F44-EEF0A5C60D26", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "71C18651-C28F-459B-B055-A01EE6E81A0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E124B14-05FE-48AB-9364-48EC03276569", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D244DE-3A8D-40AF-8151-21886264F62D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F154DE4-6D89-46ED-A32D-FB6DA29908B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*", "matchCriteriaId": "165E5734-ED3F-4EF8-9737-BF0BA8FD45D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9B93D2-0F82-410E-8936-CCEDD25E7B47", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "58F60960-266E-487C-8F07-4498A6E3EA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "09D477E3-C042-47EE-B43F-03FF4903E2C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*", "matchCriteriaId": "496EED07-44EA-4E2A-8846-74227DB432A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC056CAA-FE35-48DF-864E-3457E9ED6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "D29B97C2-5B79-4743-B5AF-77D674835E8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F84B46-E273-44A6-A89D-4E5E47BDAFAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3621F0A-8C0A-4CB3-A1F3-A7416794D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA297408-C2FB-45B6-894E-0D491F2E541C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "10283C29-ABEF-416A-A45D-BE7EFBB6891E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4B20A3D-E691-4870-953C-5F85CAB5B3AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C88C46-1716-4E4C-8C2A-AC21697E31AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "363937AB-EBBD-466D-A9FA-CD70B083D806", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*", "matchCriteriaId": "50932978-66A9-4F67-92D1-35E7FA9B4653", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DE585E-EEBE-4DB2-AF04-16038E8B2A0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "683BBAE2-89D5-4241-A981-8D7A9D8ECB9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "7437EDE5-2D70-4A46-B749-2CF13FD1B86B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "697C2608-7FD5-4A5B-8E09-1A68DDEBA73E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5D8E27-2613-4004-ACE4-B7F8643F7095", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F94922A-A450-4D24-83BB-C3A55CC803D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "096BE775-0410-4143-AA3C-DE2F70753802", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A44372-6B5E-4DB5-AD22-97B80475048B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B5AF2A-069C-4D87-89E5-11A4CE544F27", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "84CF273B-3845-48D3-824E-6898ABD4FC53", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAEE806-A1B6-40C8-BBA6-61AB180E3276", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D19365C-7125-4EA9-A8EF-02A02ACF85A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DA2CE72-088B-4CA6-894D-427CC4F2B6E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2682D17-6376-4724-B434-0989FC2221A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E984C99-B5D5-489D-8E90-5472210686BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C21D472-2364-4809-89B7-651CA25123BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5FCB9C0-8665-4850-A01C-0D1C47F34DE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*", "matchCriteriaId": "002C6967-4CCC-43B9-A687-B9B21533098E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "138F57C5-269C-4963-80EA-F1F08AB4B6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B09BF315-D3D9-46C7-8FED-C24496FF57CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBDDAAF7-FA47-41E5-8722-08AAE9049C29", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D26AE08D-9A49-4E92-A1A9-81502BE94B7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A87A49-9B28-49EF-ABC3-2A69FB39C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3047CD31-5589-4030-B31A-3E4EDF251986", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAC06352-2CB3-472C-BE76-A6995415EF47", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi." }, { "lang": "es", "value": "La interfaz web en la implementaci\u00f3n Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F y X9SR* permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres de shell, seg\u00fan lo demostrado por el campo de direcci\u00f3n IP en config_date_time.cgi." } ], "id": "CVE-2013-3608", "lastModified": "2024-11-21T01:53:58.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-08T03:17:39.587", "references": [ { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/62097" }, { "source": "cret@cert.org", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "source": "cret@cert.org", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "source": "cret@cert.org", "url": "https://support.citrix.com/article/CTX216642" }, { "source": "cret@cert.org", "tags": [ "Exploit" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/62097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX216642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F574AF-FC1C-453C-A8FB-C11F42ED8E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B966320-9479-48D4-9C08-0C5BC655588D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "502A47AC-064C-49FE-AC9C-50D0C1B62DA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "797EFABC-8823-4B42-8FA1-A26CF406166B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*", "matchCriteriaId": "978262CA-7C6A-4F3D-9480-A08230E30EB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F113C555-5E90-4458-9C30-79C3EBB8E917", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8551A73-5B20-44D5-BC9C-11F18F40C055", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEBE2CB-7349-4A9A-838F-7E4220BF74E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*", "matchCriteriaId": "39DEF117-ED63-42DF-A4E6-0A019BE82968", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCAA5397-D28D-4817-AC21-F0D0DEA95489", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CCF563E-6A20-4F99-80FB-1BED5149E8C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB097280-76E6-4DBE-BD2F-DDE3C9DBD734", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "36ACA455-CB46-4B0E-9F5B-86508907323C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A159DCC-D2F7-4409-B842-027100794679", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A34630C1-5B6A-46BD-BD0A-A1DED08003E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A5024C-F341-4DD6-ABCF-B9259937732C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "C09A30A7-C88C-4365-8D24-BFAB1EEF53F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D060E9B-0967-49E1-958B-B4557BC2634A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "6596C3C0-9DAC-43AF-9185-51E16096BAEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05C4617-F33D-40F0-8271-C4FE1578BAF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF4ECC2-7EF8-4150-AB45-D30B88BE884C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "61EB064B-5A03-4D54-BB55-15AA35B44668", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8C8686-ABA2-466F-8309-D483F128CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82B90F8-3E33-47E5-8D65-92BF39E7091D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "35FD83D9-1F28-454F-9221-9CF69F8730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "47EA3F5D-38B1-4D3F-BA3B-C03598124119", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD772BE-13CE-48F7-A24F-28825060561E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38C112C-52D0-4D29-8FF6-298AD01B981C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D46200-C176-49FE-AB45-CD1706355A56", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "95798443-906A-445B-8CB7-9FAE8223AAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "82286D8E-632D-440A-BF94-94331B195222", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D640B1-0DED-4CF0-AD43-AFFEBE953157", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "736B9BD0-E764-4321-A1A5-C8875147F701", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0490EB39-70EA-494C-855C-6698B65421FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB343D9-AA39-4837-AE84-CF8EC50B758A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "65D600FF-CA39-40C0-8535-E39971E5C34A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E690BCC-685E-4A3C-9F30-C0429B6591FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "672B902B-C4B1-4E10-AE16-34C562029D1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BE8D56-4810-470E-B284-CCD1D92736F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "45003169-49AF-4CA0-8E44-0137476D0352", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F84B957-6385-4533-B8B0-B252B695721A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*", "matchCriteriaId": "A977F207-190D-48ED-AC31-A9D500114F2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F77C1AD-12C9-492B-82B9-A5469182FEEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "B111BB68-F4D3-471D-8B99-EE4AED27974A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*", "matchCriteriaId": "39C2D975-2AEF-4083-820D-356D846DDC59", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6499489-EFEA-4C8E-B5F5-56F92DF25F2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03A480E-8EE9-4040-B1C6-3E60EBD010BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB68F879-2E55-4D12-8259-13C37004FB33", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5D8C2C-683C-4670-9878-B879AAABD54D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F818CA-1CB3-48B2-BED0-99C09A6F8259", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4401E676-3E1D-431E-ABAF-89BC9CAC64D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C27D83-5E57-4B7B-B765-B41AAA004C74", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1E2A1-71CA-48F0-8A91-E0AD896D4106", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "77777CE0-0095-4318-A194-D14CF4D699CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC43CCB5-7842-4BD3-B2DB-597815E129CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "767854D0-2DE0-4628-B6D7-18161F471718", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2EF8A1A-3BBC-44DB-8469-14B71495E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4102B60-86D2-42AC-86A9-0F690CDA0970", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "097802C6-25DA-4D55-84E7-10B4E5CC59F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "56C269C6-B569-493E-8D29-CE16C03CCA4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA6459A-758D-46D4-89F4-E4DE71FF48E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0853B35-F437-41D3-8126-0C51A788CDCA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*", "matchCriteriaId": "08F263B5-4723-4153-A751-78F539A3C64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B9DE20-58F4-4EED-950F-FF8E07313D9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFE8879B-78B1-4372-BD32-C09B6EE083DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "F26B68A6-66A9-4272-B6AE-ADCF0DE1733E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "C56CCB73-97FB-4F81-8D9E-2F441364AD22", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "D77595EF-70F4-41DD-85CF-D866AA4B3988", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB6BEBA8-B432-45BB-8756-AFC6123404B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E98461CD-D04C-4C72-9F44-EEF0A5C60D26", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "71C18651-C28F-459B-B055-A01EE6E81A0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E124B14-05FE-48AB-9364-48EC03276569", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D244DE-3A8D-40AF-8151-21886264F62D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F154DE4-6D89-46ED-A32D-FB6DA29908B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*", "matchCriteriaId": "165E5734-ED3F-4EF8-9737-BF0BA8FD45D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9B93D2-0F82-410E-8936-CCEDD25E7B47", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "58F60960-266E-487C-8F07-4498A6E3EA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "09D477E3-C042-47EE-B43F-03FF4903E2C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*", "matchCriteriaId": "496EED07-44EA-4E2A-8846-74227DB432A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC056CAA-FE35-48DF-864E-3457E9ED6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "D29B97C2-5B79-4743-B5AF-77D674835E8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F84B46-E273-44A6-A89D-4E5E47BDAFAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3621F0A-8C0A-4CB3-A1F3-A7416794D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA297408-C2FB-45B6-894E-0D491F2E541C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "10283C29-ABEF-416A-A45D-BE7EFBB6891E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4B20A3D-E691-4870-953C-5F85CAB5B3AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C88C46-1716-4E4C-8C2A-AC21697E31AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "363937AB-EBBD-466D-A9FA-CD70B083D806", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*", "matchCriteriaId": "50932978-66A9-4F67-92D1-35E7FA9B4653", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DE585E-EEBE-4DB2-AF04-16038E8B2A0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "683BBAE2-89D5-4241-A981-8D7A9D8ECB9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "7437EDE5-2D70-4A46-B749-2CF13FD1B86B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "697C2608-7FD5-4A5B-8E09-1A68DDEBA73E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5D8E27-2613-4004-ACE4-B7F8643F7095", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F94922A-A450-4D24-83BB-C3A55CC803D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "096BE775-0410-4143-AA3C-DE2F70753802", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A44372-6B5E-4DB5-AD22-97B80475048B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B5AF2A-069C-4D87-89E5-11A4CE544F27", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "84CF273B-3845-48D3-824E-6898ABD4FC53", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAEE806-A1B6-40C8-BBA6-61AB180E3276", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D19365C-7125-4EA9-A8EF-02A02ACF85A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DA2CE72-088B-4CA6-894D-427CC4F2B6E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2682D17-6376-4724-B434-0989FC2221A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E984C99-B5D5-489D-8E90-5472210686BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C21D472-2364-4809-89B7-651CA25123BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5FCB9C0-8665-4850-A01C-0D1C47F34DE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*", "matchCriteriaId": "002C6967-4CCC-43B9-A687-B9B21533098E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "138F57C5-269C-4963-80EA-F1F08AB4B6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B09BF315-D3D9-46C7-8FED-C24496FF57CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBDDAAF7-FA47-41E5-8722-08AAE9049C29", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D26AE08D-9A49-4E92-A1A9-81502BE94B7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A87A49-9B28-49EF-ABC3-2A69FB39C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3047CD31-5589-4030-B31A-3E4EDF251986", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAC06352-2CB3-472C-BE76-A6995415EF47", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi." }, { "lang": "es", "value": "Multiples desbordamientos de buffer basados en pila en la interfaz web de la implementaci\u00f3n de Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, y X9SR* permite a atacantes remotos ejecutar c\u00f3digo arbitrario en el Baseboard Management Controller (BMC), como se muestra en el campo de (1) usuario o (2) contrase\u00f1a en login.cgi." } ], "id": "CVE-2013-3607", "lastModified": "2024-11-21T01:53:58.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-08T03:17:39.563", "references": [ { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/62094" }, { "source": "cret@cert.org", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "source": "cret@cert.org", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "source": "cret@cert.org", "url": "https://support.citrix.com/article/CTX216642" }, { "source": "cret@cert.org", "tags": [ "Exploit" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/62094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX216642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F574AF-FC1C-453C-A8FB-C11F42ED8E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B966320-9479-48D4-9C08-0C5BC655588D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "502A47AC-064C-49FE-AC9C-50D0C1B62DA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "797EFABC-8823-4B42-8FA1-A26CF406166B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*", "matchCriteriaId": "978262CA-7C6A-4F3D-9480-A08230E30EB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F113C555-5E90-4458-9C30-79C3EBB8E917", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8551A73-5B20-44D5-BC9C-11F18F40C055", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EEBE2CB-7349-4A9A-838F-7E4220BF74E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*", "matchCriteriaId": "39DEF117-ED63-42DF-A4E6-0A019BE82968", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCAA5397-D28D-4817-AC21-F0D0DEA95489", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CCF563E-6A20-4F99-80FB-1BED5149E8C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB097280-76E6-4DBE-BD2F-DDE3C9DBD734", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "36ACA455-CB46-4B0E-9F5B-86508907323C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A159DCC-D2F7-4409-B842-027100794679", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A34630C1-5B6A-46BD-BD0A-A1DED08003E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A5024C-F341-4DD6-ABCF-B9259937732C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "C09A30A7-C88C-4365-8D24-BFAB1EEF53F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D060E9B-0967-49E1-958B-B4557BC2634A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "6596C3C0-9DAC-43AF-9185-51E16096BAEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05C4617-F33D-40F0-8271-C4FE1578BAF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF4ECC2-7EF8-4150-AB45-D30B88BE884C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "61EB064B-5A03-4D54-BB55-15AA35B44668", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8C8686-ABA2-466F-8309-D483F128CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82B90F8-3E33-47E5-8D65-92BF39E7091D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "35FD83D9-1F28-454F-9221-9CF69F8730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "47EA3F5D-38B1-4D3F-BA3B-C03598124119", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD772BE-13CE-48F7-A24F-28825060561E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38C112C-52D0-4D29-8FF6-298AD01B981C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D46200-C176-49FE-AB45-CD1706355A56", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "95798443-906A-445B-8CB7-9FAE8223AAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "82286D8E-632D-440A-BF94-94331B195222", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D640B1-0DED-4CF0-AD43-AFFEBE953157", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*", "matchCriteriaId": "736B9BD0-E764-4321-A1A5-C8875147F701", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0490EB39-70EA-494C-855C-6698B65421FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DB343D9-AA39-4837-AE84-CF8EC50B758A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "65D600FF-CA39-40C0-8535-E39971E5C34A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E690BCC-685E-4A3C-9F30-C0429B6591FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "672B902B-C4B1-4E10-AE16-34C562029D1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BE8D56-4810-470E-B284-CCD1D92736F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "45003169-49AF-4CA0-8E44-0137476D0352", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F84B957-6385-4533-B8B0-B252B695721A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*", "matchCriteriaId": "A977F207-190D-48ED-AC31-A9D500114F2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F77C1AD-12C9-492B-82B9-A5469182FEEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "B111BB68-F4D3-471D-8B99-EE4AED27974A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*", "matchCriteriaId": "39C2D975-2AEF-4083-820D-356D846DDC59", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6499489-EFEA-4C8E-B5F5-56F92DF25F2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03A480E-8EE9-4040-B1C6-3E60EBD010BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB68F879-2E55-4D12-8259-13C37004FB33", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5D8C2C-683C-4670-9878-B879AAABD54D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F818CA-1CB3-48B2-BED0-99C09A6F8259", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4401E676-3E1D-431E-ABAF-89BC9CAC64D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C27D83-5E57-4B7B-B765-B41AAA004C74", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1E2A1-71CA-48F0-8A91-E0AD896D4106", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "77777CE0-0095-4318-A194-D14CF4D699CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC43CCB5-7842-4BD3-B2DB-597815E129CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "767854D0-2DE0-4628-B6D7-18161F471718", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2EF8A1A-3BBC-44DB-8469-14B71495E8AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4102B60-86D2-42AC-86A9-0F690CDA0970", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "097802C6-25DA-4D55-84E7-10B4E5CC59F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "56C269C6-B569-493E-8D29-CE16C03CCA4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA6459A-758D-46D4-89F4-E4DE71FF48E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0853B35-F437-41D3-8126-0C51A788CDCA", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*", "matchCriteriaId": "08F263B5-4723-4153-A751-78F539A3C64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B9DE20-58F4-4EED-950F-FF8E07313D9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFE8879B-78B1-4372-BD32-C09B6EE083DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "F26B68A6-66A9-4272-B6AE-ADCF0DE1733E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "C56CCB73-97FB-4F81-8D9E-2F441364AD22", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "D77595EF-70F4-41DD-85CF-D866AA4B3988", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB6BEBA8-B432-45BB-8756-AFC6123404B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "E98461CD-D04C-4C72-9F44-EEF0A5C60D26", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "71C18651-C28F-459B-B055-A01EE6E81A0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E124B14-05FE-48AB-9364-48EC03276569", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "19D244DE-3A8D-40AF-8151-21886264F62D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F154DE4-6D89-46ED-A32D-FB6DA29908B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*", "matchCriteriaId": "165E5734-ED3F-4EF8-9737-BF0BA8FD45D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9B93D2-0F82-410E-8936-CCEDD25E7B47", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "58F60960-266E-487C-8F07-4498A6E3EA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "09D477E3-C042-47EE-B43F-03FF4903E2C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*", "matchCriteriaId": "496EED07-44EA-4E2A-8846-74227DB432A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC056CAA-FE35-48DF-864E-3457E9ED6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "D29B97C2-5B79-4743-B5AF-77D674835E8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F84B46-E273-44A6-A89D-4E5E47BDAFAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3621F0A-8C0A-4CB3-A1F3-A7416794D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA297408-C2FB-45B6-894E-0D491F2E541C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "10283C29-ABEF-416A-A45D-BE7EFBB6891E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4B20A3D-E691-4870-953C-5F85CAB5B3AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C88C46-1716-4E4C-8C2A-AC21697E31AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "363937AB-EBBD-466D-A9FA-CD70B083D806", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*", "matchCriteriaId": "50932978-66A9-4F67-92D1-35E7FA9B4653", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DE585E-EEBE-4DB2-AF04-16038E8B2A0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "683BBAE2-89D5-4241-A981-8D7A9D8ECB9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "7437EDE5-2D70-4A46-B749-2CF13FD1B86B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "697C2608-7FD5-4A5B-8E09-1A68DDEBA73E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5D8E27-2613-4004-ACE4-B7F8643F7095", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F94922A-A450-4D24-83BB-C3A55CC803D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "096BE775-0410-4143-AA3C-DE2F70753802", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A44372-6B5E-4DB5-AD22-97B80475048B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B5AF2A-069C-4D87-89E5-11A4CE544F27", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "84CF273B-3845-48D3-824E-6898ABD4FC53", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAEE806-A1B6-40C8-BBA6-61AB180E3276", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D19365C-7125-4EA9-A8EF-02A02ACF85A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DA2CE72-088B-4CA6-894D-427CC4F2B6E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2682D17-6376-4724-B434-0989FC2221A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*", "matchCriteriaId": "83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E984C99-B5D5-489D-8E90-5472210686BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C21D472-2364-4809-89B7-651CA25123BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5FCB9C0-8665-4850-A01C-0D1C47F34DE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*", "matchCriteriaId": "002C6967-4CCC-43B9-A687-B9B21533098E", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "138F57C5-269C-4963-80EA-F1F08AB4B6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B09BF315-D3D9-46C7-8FED-C24496FF57CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBDDAAF7-FA47-41E5-8722-08AAE9049C29", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D26AE08D-9A49-4E92-A1A9-81502BE94B7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A87A49-9B28-49EF-ABC3-2A69FB39C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3047CD31-5589-4030-B31A-3E4EDF251986", "vulnerable": true }, { "criteria": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAC06352-2CB3-472C-BE76-A6995415EF47", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function." }, { "lang": "es", "value": "La interfaz web en la implementaci\u00f3n Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F y X9SR* confie en el c\u00f3digo JavaScript en el cliente para comprobaciones de autorizaci\u00f3n, lo que permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso a trav\u00e9s de una solicitud manipulada, relacionado con la funci\u00f3n PrivilegeCallBack." } ], "id": "CVE-2013-3609", "lastModified": "2024-11-21T01:53:58.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-08T03:17:39.603", "references": [ { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/62098" }, { "source": "cret@cert.org", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "source": "cret@cert.org", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "source": "cret@cert.org", "url": "https://support.citrix.com/article/CTX216642" }, { "source": "cret@cert.org", "tags": [ "Exploit" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/62098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX216642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2013-3609
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/62098 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/648646 | third-party-advisory, x_refsource_CERT-VN | |
http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf | x_refsource_CONFIRM | |
https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf | x_refsource_MISC | |
http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013 | x_refsource_MISC | |
https://support.citrix.com/article/CTX216642 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62098", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62098" }, { "name": "VU#648646", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX216642" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "62098", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62098" }, { "name": "VU#648646", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX216642" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2013-3609", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62098" }, { "name": "VU#648646", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/648646" }, { "name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf", "refsource": "CONFIRM", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf", "refsource": "MISC", "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013", "refsource": "MISC", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX216642" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2013-3609", "datePublished": "2013-09-08T01:00:00", "dateReserved": "2013-05-21T00:00:00", "dateUpdated": "2024-08-06T16:14:56.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3607
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/62094 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/648646 | third-party-advisory, x_refsource_CERT-VN | |
http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf | x_refsource_CONFIRM | |
https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf | x_refsource_MISC | |
http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013 | x_refsource_MISC | |
https://support.citrix.com/article/CTX216642 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62094", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62094" }, { "name": "VU#648646", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX216642" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "62094", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62094" }, { "name": "VU#648646", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX216642" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2013-3607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62094", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62094" }, { "name": "VU#648646", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/648646" }, { "name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf", "refsource": "CONFIRM", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf", "refsource": "MISC", "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013", "refsource": "MISC", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX216642" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2013-3607", "datePublished": "2013-09-08T01:00:00", "dateReserved": "2013-05-21T00:00:00", "dateUpdated": "2024-08-06T16:14:56.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3608
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/648646 | third-party-advisory, x_refsource_CERT-VN | |
http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf | x_refsource_CONFIRM | |
https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf | x_refsource_MISC | |
http://www.securityfocus.com/bid/62097 | vdb-entry, x_refsource_BID | |
http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013 | x_refsource_MISC | |
https://support.citrix.com/article/CTX216642 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.542Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#648646", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "name": "62097", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62097" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX216642" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#648646", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/648646" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "name": "62097", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62097" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX216642" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2013-3608", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#648646", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/648646" }, { "name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf", "refsource": "CONFIRM", "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf", "refsource": "MISC", "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "name": "62097", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62097" }, { "name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013", "refsource": "MISC", "url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX216642" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2013-3608", "datePublished": "2013-09-08T01:00:00", "dateReserved": "2013-05-21T00:00:00", "dateUpdated": "2024-08-06T16:14:56.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201309-0164
Vulnerability from variot
The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi. Supermicro IPMI Web Interface is prone to an unspecified remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0164", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "x9sri-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sre-3f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sre-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9spu-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9scm-iif", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srl-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srg-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srd-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srw-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sri-3f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9drff-itg\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sbaa-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-itpf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sca-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dcl-6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgi-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6tf\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-7tpf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-i", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-itf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7ln4f-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-hln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7jln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9db3-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-3ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtn\\+-f-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-ef", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbu-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sie-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scd-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dcl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sil-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgg-qf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-hf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spa-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-hf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-htf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbi-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scff-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-3tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-if-hft", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dre-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgu-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8siu-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9db3-tpf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sia-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6f\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scm-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtn\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spa-hf-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-ibff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-i\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dri-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sie-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spt-df-d525\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scl\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbu-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbi-tpf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-ln4f-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-hibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hlf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-7", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-ef", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-ln4f\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sit-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-itf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr3-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sme-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sce-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sci-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-it\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scl-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dre-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8si6-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-7tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-h-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hlibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgu-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qri-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spt-df-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7tg\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-ig\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-hf-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7g\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-htf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dri-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dg6-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6ibff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7f-hft", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7t\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drfr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drx\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr3-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sit-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8scm-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qri-f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sgl-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "supermicro", "version": null }, { "model": "h8dcl-6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dcl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-hibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-hln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dg6-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgg-qf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgi-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hlf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hlibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgu-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8scm-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sgl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sme-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-7", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-i", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spa-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spa-hf-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-h-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-hf-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spt-df-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spt-df-d525+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtn+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtn+-f-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6f+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6tf+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-ln4f+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8si6-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sia-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sie-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sie-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sil-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sit-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sit-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8siu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7f-hft", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-if-hft", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-itf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9db3-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9db3-tpf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbi-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbi-tpf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbu-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbu-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr3-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr3-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-ln4f-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7jln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7ln4f-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-ef", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dre-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dre-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7g+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7t+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7tg+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-i+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-ig+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-it+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-itg+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drfr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-hf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-htf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-htf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-7tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-itf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dri-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-ef", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6ibff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-hf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-ibff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-3ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-3tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-7tpf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-itpf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drx+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qri-f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sbaa-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sca-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scd-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sce-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scff-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sci-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scl+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scm-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scm-iif", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9spu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srd-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sre-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sre-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srg-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sri-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srw-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "micro computer supermicro x9srl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sri-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9srg-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sre-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sre-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9srd-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9spu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scm-iif", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scm-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scl+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sci-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scff-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sce-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scd-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sca-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sbaa-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qri-f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drx+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-itpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-7tpf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-3tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-3ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-ibff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-hf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6ibff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-ef", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dri-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-itf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-7tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-htf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-htf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-hf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drfr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-itg+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-it+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-ig+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-i+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7tg+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7t+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7g+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dre-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dre-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-ef", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7ln4f-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7jln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-ln4f-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr3-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr3-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbu-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbu-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbi-tpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbi-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9db3-tpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9db3-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-itf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-if-hft", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7f-hft", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8siu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sit-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sit-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sil-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sie-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sie-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sia-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8si6-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-ln4f+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6tf+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6f+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtn+-f-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtn+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spt-df-d525+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spt-df-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-hf-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-h-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spa-hf-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spa-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-i", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-7", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sme-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sgl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8scm-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgu-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hlibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hlf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgi-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgg-qf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dg6-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-hln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-hibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dcl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dcl-6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "netscaler t1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "command center appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "cloudbridge", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "BID", "id": "62097" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "CNNVD", "id": "CNNVD-201308-543" }, { "db": "NVD", "id": "CVE-2013-3608" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:supermicro:h8dcl-6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dcl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-hibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-hln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dg6-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgg-qf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgi-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hlf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hlibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgu-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8scm-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sgl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sme-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-7", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spa-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spa-hf-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-h-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-hf-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8si6-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sia-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sie-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sie-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sil-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sit-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sit-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8siu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7f-hft", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-if-hft", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-itf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9db3-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9db3-tpf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbi-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbi-tpf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbu-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbu-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr3-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr3-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7jln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-ef", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dre-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dre-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7g%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7t%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7tg%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-i%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-ig%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-it%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-itg%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drfr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-hf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-htf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-htf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-7tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-itf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dri-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-ef", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-hf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-ibff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-3ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-3tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-7tpf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-itpf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drx%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qri-f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sbaa-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sca-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scd-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sce-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scff-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sci-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scl%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scm-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scm-iif", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9spu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srd-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sre-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sre-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srg-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sri-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srw-f", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003993" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "J. Alex Halderman", "sources": [ { "db": "BID", "id": "62097" }, { "db": "CNNVD", "id": "CNNVD-201308-543" } ], "trust": 0.9 }, "cve": "CVE-2013-3608", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2013-3608", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3608", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3608", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201308-543", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2013-3608", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3608" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "CNNVD", "id": "CNNVD-201308-543" }, { "db": "NVD", "id": "CVE-2013-3608" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi. Supermicro IPMI Web Interface is prone to an unspecified remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data", "sources": [ { "db": "NVD", "id": "CVE-2013-3608" }, { "db": "CERT/CC", "id": "VU#648646" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "BID", "id": "62097" }, { "db": "VULMON", "id": "CVE-2013-3608" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#648646", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2013-3608", "trust": 2.8 }, { "db": "BID", "id": "62097", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU96655201", "trust": 0.8 }, { "db": "USCERT", "id": "TA13-207A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003993", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201308-543", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2013-3608", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3608" }, { "db": "BID", "id": "62097" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "CNNVD", "id": "CNNVD-201308-543" }, { "db": "NVD", "id": "CVE-2013-3608" } ] }, "id": "VAR-201309-0164", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.225 }, "last_update_date": "2024-11-23T22:27:23.499000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.supermicro.com.tw/index_home.cfm" }, { "title": "Firmware Fixes to Common Vulnerabilities and Exposures", "trust": 0.8, "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc" } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3608" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "NVD", "id": "CVE-2013-3608" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/648646" }, { "trust": 2.5, "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "trust": 1.9, "url": "http://www.supermicro.com/products/nfo/files/ipmi/cve_update.pdf" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/62097" }, { "trust": 1.6, "url": "http://www.supermicro.com/support/faqs/faq.cfm?faq=16536" }, { "trust": 1.4, "url": "https://support.citrix.com/article/ctx216642" }, { "trust": 1.1, "url": "http://www.thomas-krenn.com/en/wiki/supermicro_ipmi_security_updates_november_2013" }, { "trust": 0.8, "url": "http://www.supermicro.com/" }, { "trust": 0.8, "url": "https://www.usenix.org/conference/woot13/illuminating-security-issues-surrounding-lights-out-server-management" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3608" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu96655201/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3608" }, { "trust": 0.8, "url": "http://www.us-cert.gov/ncas/alerts/ta13-207a" }, { "trust": 0.3, "url": "http://www.supermicro.com/about/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3608" }, { "db": "BID", "id": "62097" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "CNNVD", "id": "CNNVD-201308-543" }, { "db": "NVD", "id": "CVE-2013-3608" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3608" }, { "db": "BID", "id": "62097" }, { "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "db": "CNNVD", "id": "CNNVD-201308-543" }, { "db": "NVD", "id": "CVE-2013-3608" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-30T00:00:00", "db": "CERT/CC", "id": "VU#648646" }, { "date": "2013-09-08T00:00:00", "db": "VULMON", "id": "CVE-2013-3608" }, { "date": "2013-08-30T00:00:00", "db": "BID", "id": "62097" }, { "date": "2013-09-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "date": "2013-08-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-543" }, { "date": "2013-09-08T03:17:39.587000", "db": "NVD", "id": "CVE-2013-3608" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-29T00:00:00", "db": "CERT/CC", "id": "VU#648646" }, { "date": "2017-11-15T00:00:00", "db": "VULMON", "id": "CVE-2013-3608" }, { "date": "2016-09-09T15:00:00", "db": "BID", "id": "62097" }, { "date": "2013-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003993" }, { "date": "2013-09-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-543" }, { "date": "2024-11-21T01:53:58.773000", "db": "NVD", "id": "CVE-2013-3608" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-543" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Supermicro IPMI based on ATEN firmware contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#648646" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-543" } ], "trust": 0.6 } }
var-201309-0165
Vulnerability from variot
The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function. Supermicro Intelligent Platform Management Interface (IPMI) implementations based on ATEN firmware contain multiple vulnerabilities in their web management interface. Supermicro IPMI Web Interface is prone to a remote privilege-escalation vulnerability because it fails to adequately sanitize user-supplied input data. Remote attackers can exploit this issue to gain elevated privileges and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0165", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "x9sri-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sre-3f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sre-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9spu-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9scm-iif", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srl-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srg-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srd-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srw-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sri-3f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9drff-itg\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sbaa-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-itpf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sca-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dcl-6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgi-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6tf\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-7tpf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-i", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-itf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7ln4f-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-hln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7jln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9db3-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-3ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtn\\+-f-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-ef", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbu-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sie-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scd-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dcl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sil-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgg-qf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-hf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spa-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-hf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-htf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbi-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scff-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-3tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-if-hft", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dre-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgu-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8siu-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9db3-tpf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sia-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6f\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scm-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtn\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spa-hf-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-ibff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-i\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dri-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sie-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spt-df-d525\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scl\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbu-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbi-tpf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-ln4f-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-hibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hlf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-7", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-ef", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-ln4f\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sit-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-itf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr3-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sme-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sce-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sci-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-it\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scl-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dre-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8si6-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-7tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-h-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hlibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgu-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qri-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spt-df-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7tg\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-ig\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-hf-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7g\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-htf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dri-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dg6-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6ibff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7f-hft", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7t\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drfr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drx\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr3-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sit-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8scm-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qri-f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sgl-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "supermicro", "version": null }, { "model": "h8dcl-6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dcl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-hibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-hln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dg6-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgg-qf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgi-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hlf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hlibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgu-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8scm-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sgl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sme-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-7", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-i", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spa-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spa-hf-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-h-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-hf-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spt-df-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spt-df-d525+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtn+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtn+-f-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6f+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6tf+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-ln4f+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8si6-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sia-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sie-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sie-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sil-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sit-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sit-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8siu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7f-hft", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-if-hft", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-itf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9db3-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9db3-tpf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbi-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbi-tpf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbu-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbu-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr3-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr3-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-ln4f-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7jln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7ln4f-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-ef", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dre-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dre-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7g+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7t+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7tg+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-i+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-ig+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-it+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-itg+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drfr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-hf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-htf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-htf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-7tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-itf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dri-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-ef", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6ibff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-hf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-ibff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-3ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-3tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-7tpf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-itpf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drx+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qri-f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sbaa-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sca-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scd-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sce-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scff-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sci-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scl+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scm-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scm-iif", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9spu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srd-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sre-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sre-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srg-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sri-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srw-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "micro computer supermicro x9srl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sri-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9srg-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sre-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sre-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9srd-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9spu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scm-iif", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scm-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scl+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sci-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scff-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sce-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scd-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sca-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sbaa-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qri-f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drx+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-itpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-7tpf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-3tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-3ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-ibff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-hf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6ibff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-ef", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dri-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-itf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-7tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-htf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-htf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-hf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drfr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-itg+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-it+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-ig+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-i+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7tg+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7t+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7g+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dre-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dre-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-ef", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7ln4f-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7jln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-ln4f-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr3-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr3-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbu-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbu-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbi-tpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbi-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9db3-tpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9db3-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-itf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-if-hft", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7f-hft", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8siu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sit-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sit-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sil-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sie-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sie-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sia-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8si6-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-ln4f+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6tf+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6f+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtn+-f-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtn+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spt-df-d525+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spt-df-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-hf-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-h-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spa-hf-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spa-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-i", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-7", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sme-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sgl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8scm-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgu-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hlibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hlf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgi-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgg-qf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dg6-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-hln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-hibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dcl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dcl-6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "netscaler t1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "command center appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "cloudbridge", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "BID", "id": "62098" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "CNNVD", "id": "CNNVD-201308-544" }, { "db": "NVD", "id": "CVE-2013-3609" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:supermicro:h8dcl-6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dcl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-hibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-hln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dg6-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgg-qf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgi-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hlf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hlibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgu-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8scm-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sgl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sme-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-7", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spa-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spa-hf-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-h-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-hf-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8si6-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sia-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sie-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sie-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sil-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sit-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sit-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8siu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7f-hft", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-if-hft", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-itf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9db3-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9db3-tpf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbi-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbi-tpf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbu-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbu-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr3-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr3-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7jln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-ef", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dre-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dre-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7g%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7t%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7tg%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-i%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-ig%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-it%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-itg%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drfr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-hf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-htf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-htf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-7tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-itf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dri-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-ef", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-hf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-ibff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-3ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-3tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-7tpf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-itpf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drx%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qri-f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sbaa-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sca-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scd-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sce-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scff-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sci-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scl%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scm-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scm-iif", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9spu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srd-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sre-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sre-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srg-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sri-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srw-f", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003994" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "J. Alex Halderman", "sources": [ { "db": "BID", "id": "62098" }, { "db": "CNNVD", "id": "CNNVD-201308-544" } ], "trust": 0.9 }, "cve": "CVE-2013-3609", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2013-3609", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3609", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3609", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201308-544", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2013-3609", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3609" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "CNNVD", "id": "CNNVD-201308-544" }, { "db": "NVD", "id": "CVE-2013-3609" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function. Supermicro Intelligent Platform Management Interface (IPMI) implementations based on ATEN firmware contain multiple vulnerabilities in their web management interface. Supermicro IPMI Web Interface is prone to a remote privilege-escalation vulnerability because it fails to adequately sanitize user-supplied input data. \nRemote attackers can exploit this issue to gain elevated privileges and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2013-3609" }, { "db": "CERT/CC", "id": "VU#648646" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "BID", "id": "62098" }, { "db": "VULMON", "id": "CVE-2013-3609" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#648646", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2013-3609", "trust": 2.8 }, { "db": "BID", "id": "62098", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU96655201", "trust": 0.8 }, { "db": "USCERT", "id": "TA13-207A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003994", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201308-544", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2013-3609", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3609" }, { "db": "BID", "id": "62098" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "CNNVD", "id": "CNNVD-201308-544" }, { "db": "NVD", "id": "CVE-2013-3609" } ] }, "id": "VAR-201309-0165", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.225 }, "last_update_date": "2024-11-23T22:27:23.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.supermicro.com.tw/index_home.cfm" }, { "title": "Firmware Fixes to Common Vulnerabilities and Exposures", "trust": 0.8, "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc" } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3609" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "NVD", "id": "CVE-2013-3609" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/648646" }, { "trust": 2.5, "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "trust": 1.9, "url": "http://www.supermicro.com/products/nfo/files/ipmi/cve_update.pdf" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/62098" }, { "trust": 1.6, "url": "http://www.supermicro.com/support/faqs/faq.cfm?faq=16536" }, { "trust": 1.4, "url": "https://support.citrix.com/article/ctx216642" }, { "trust": 1.1, "url": "http://www.thomas-krenn.com/en/wiki/supermicro_ipmi_security_updates_november_2013" }, { "trust": 0.8, "url": "http://www.supermicro.com/" }, { "trust": 0.8, "url": "https://www.usenix.org/conference/woot13/illuminating-security-issues-surrounding-lights-out-server-management" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3609" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu96655201/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3609" }, { "trust": 0.8, "url": "http://www.us-cert.gov/ncas/alerts/ta13-207a" }, { "trust": 0.3, "url": "http://www.supermicro.com/about/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3609" }, { "db": "BID", "id": "62098" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "CNNVD", "id": "CNNVD-201308-544" }, { "db": "NVD", "id": "CVE-2013-3609" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3609" }, { "db": "BID", "id": "62098" }, { "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "db": "CNNVD", "id": "CNNVD-201308-544" }, { "db": "NVD", "id": "CVE-2013-3609" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-30T00:00:00", "db": "CERT/CC", "id": "VU#648646" }, { "date": "2013-09-08T00:00:00", "db": "VULMON", "id": "CVE-2013-3609" }, { "date": "2013-08-30T00:00:00", "db": "BID", "id": "62098" }, { "date": "2013-09-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "date": "2013-08-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-544" }, { "date": "2013-09-08T03:17:39.603000", "db": "NVD", "id": "CVE-2013-3609" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-29T00:00:00", "db": "CERT/CC", "id": "VU#648646" }, { "date": "2017-11-15T00:00:00", "db": "VULMON", "id": "CVE-2013-3609" }, { "date": "2016-09-09T15:00:00", "db": "BID", "id": "62098" }, { "date": "2013-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003994" }, { "date": "2013-09-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-544" }, { "date": "2024-11-21T01:53:58.910000", "db": "NVD", "id": "CVE-2013-3609" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-544" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Supermicro IPMI based on ATEN firmware contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#648646" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-544" } ], "trust": 0.6 } }
var-201309-0235
Vulnerability from variot
Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi. Supermicro IPMI is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code in the context of the device that uses the affected interface. Failed exploit attempts will likely crash the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "x9sri-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sre-3f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sre-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9spu-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9scm-iif", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srl-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srg-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srd-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9srw-f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9sri-3f", "scope": "eq", "trust": 1.6, "vendor": "supermicro", "version": null }, { "model": "x9drff-itg\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sbaa-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-itpf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sca-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dcl-6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgi-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6tf\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-7tpf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-i", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-itf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7ln4f-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-hln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7jln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9db3-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-3ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtn\\+-f-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-ef", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbu-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sie-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scd-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dcl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sil-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgg-qf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-hf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spa-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-hf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-htf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbi-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scff-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drw-3tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-if-hft", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dre-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgu-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8siu-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9db3-tpf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sia-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6f\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-7f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drd-7ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scm-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtn\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbl-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spa-hf-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-ibff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-i\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dri-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sie-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spt-df-d525\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scl\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbu-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbi-tpf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dbl-3f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-ln4f-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr7-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dct-hibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hlf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-7", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drl-ef", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sml-if", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-ln4f\\+-lr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sit-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-itf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr3-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sme-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sce-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9sci-ln4f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-it\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9scl-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dre-tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtu-6tf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8si6-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drh-7tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-h-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hlibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgu-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qri-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spt-df-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7tg\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dgt-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-ig\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x7spe-hf-d525", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7g\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drg-htf\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dri-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8dg6-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf-jbod", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6ibff", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dax-7f-hft", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drff-7t\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drfr", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drx\\+-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8dtl-6f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9dr3-ln4f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9drt-h6ibqf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x8sit-hf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qr7-tf", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8scm-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "x9qri-f\\+", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": "h8sgl-f", "scope": "eq", "trust": 1.0, "vendor": "supermicro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "supermicro", "version": null }, { "model": "h8dcl-6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dcl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-hibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-hln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dct-ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dg6-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgg-qf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgi-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hlf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgt-hlibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8dgu-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8scm-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sgl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sme-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-7", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-i", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "h8sml-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spa-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spa-hf-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-h-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spe-hf-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spt-df-d525", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x7spt-df-d525+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtn+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtn+-f-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6f+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-6tf+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8dtu-ln4f+-lr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8si6-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sia-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sie-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sie-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sil-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sit-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8sit-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x8siu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7f-hft", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-7tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-if-hft", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dax-itf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9db3-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9db3-tpf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbi-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbi-tpf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbu-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dbu-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr3-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr3-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-ln4f-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dr7-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7jln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-7ln4f-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-ef", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drd-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dre-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dre-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7g+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7t+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-7tg+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-i+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-ig+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-it+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drff-itg+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drfr", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-hf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-hf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-htf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drg-htf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-7f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-7tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drh-itf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9dri-ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-ef", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drl-if", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6ibff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-h6ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-hf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-ibff", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drt-ibqf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-3ln4f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-3tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-7tpf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drw-itpf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9drx+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qr7-tf-jbod", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9qri-f+", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sbaa-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sca-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scd-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sce-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scff-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sci-ln4f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scl+-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scm-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9scm-iif", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9spu-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srd-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sre-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sre-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srg-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sri-3f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9sri-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srl-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "x9srw-f", "scope": null, "trust": 0.8, "vendor": "super micro computer", "version": null }, { "model": "micro computer supermicro x9srl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sri-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9srg-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sre-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sre-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9srd-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9spu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scm-iif", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scm-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scl+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sci-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scff-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sce-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9scd-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sca-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9sbaa-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qri-f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9qr7-tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drx+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-itpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-7tpf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-3tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drw-3ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-ibff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-hf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6ibff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-h6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drt-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-ef", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dri-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dri-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-itf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-7tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drh-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-htf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-htf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-hf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drg-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drfr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-itg+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-it+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-ig+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-i+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7tg+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7t+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7g+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff-7", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drff", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dre-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dre-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-ef", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7ln4f-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9drd-7jln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-ln4f-jbod", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr7-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr3-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dr3-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbu-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbu-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbi-tpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dbi-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9db3-tpf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9db3-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-itf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-if-hft", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7tf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7f-hft", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x9dax-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8siu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sit-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sit-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sil-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sie-ln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sie-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8sia-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8si6-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-ln4f+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6tf+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6tf+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6f+-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtu-6f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtn+-f-lr", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtn+-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x8dtl-3f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spt-df-d525+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spt-df-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-hf-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spe-h-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spa-hf-d525", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro x7spa-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-i", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-7f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sml-7", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sme-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8sgl-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8scm-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgu-ln4f+", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgu-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hlibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hlf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgt-hf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgi-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dgg-qf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dg6-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-ibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-hln4f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-hibqf", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dct-f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dcl-if", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "micro computer supermicro h8dcl-6f", "scope": null, "trust": 0.3, "vendor": "super", "version": null }, { "model": "netscaler t1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "command center appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "cloudbridge", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "BID", "id": "62094" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "CNNVD", "id": "CNNVD-201308-541" }, { "db": "NVD", "id": "CVE-2013-3607" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:supermicro:h8dcl-6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dcl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-hibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-hln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dct-ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dg6-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgg-qf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgi-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hlf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgt-hlibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8dgu-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8scm-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sgl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sme-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-7", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:h8sml-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spa-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spa-hf-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-h-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spe-hf-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b-lr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8si6-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sia-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sie-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sie-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sil-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sit-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8sit-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x8siu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7f-hft", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-7tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-if-hft", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dax-itf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9db3-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9db3-tpf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbi-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbi-tpf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbu-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dbu-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr3-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr3-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dr7-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7jln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-ef", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drd-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dre-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dre-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7g%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7t%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-7tg%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-i%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-ig%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-it%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drff-itg%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drfr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-hf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-hf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-htf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drg-htf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-7f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-7tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drh-itf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9dri-ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-ef", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drl-if", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-hf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-ibff", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drt-ibqf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-3ln4f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-3tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-7tpf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drw-itpf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9drx%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qr7-tf-jbod", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9qri-f%2b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sbaa-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sca-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scd-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sce-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scff-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sci-ln4f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scl%2b-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scm-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9scm-iif", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9spu-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srd-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sre-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sre-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srg-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sri-3f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9sri-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srl-f", "vulnerable": true }, { "cpe22Uri": "cpe:/h:supermicro:x9srw-f", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003992" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "J. Alex Halderman", "sources": [ { "db": "BID", "id": "62094" }, { "db": "CNNVD", "id": "CNNVD-201308-541" } ], "trust": 0.9 }, "cve": "CVE-2013-3607", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2013-3607", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3607", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3607", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201308-541", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2013-3607", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3607" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "CNNVD", "id": "CNNVD-201308-541" }, { "db": "NVD", "id": "CVE-2013-3607" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi. Supermicro IPMI is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. \nAn attacker can exploit these issues to execute arbitrary code in the context of the device that uses the affected interface. Failed exploit attempts will likely crash the device", "sources": [ { "db": "NVD", "id": "CVE-2013-3607" }, { "db": "CERT/CC", "id": "VU#648646" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "BID", "id": "62094" }, { "db": "VULMON", "id": "CVE-2013-3607" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#648646", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2013-3607", "trust": 2.8 }, { "db": "BID", "id": "62094", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU96655201", "trust": 0.8 }, { "db": "USCERT", "id": "TA13-207A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003992", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201308-541", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2013-3607", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3607" }, { "db": "BID", "id": "62094" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "CNNVD", "id": "CNNVD-201308-541" }, { "db": "NVD", "id": "CVE-2013-3607" } ] }, "id": "VAR-201309-0235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.225 }, "last_update_date": "2024-11-23T22:27:23.461000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.supermicro.com.tw/index_home.cfm" }, { "title": "Firmware Fixes to Common Vulnerabilities and Exposures", "trust": 0.8, "url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf" }, { "title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc" } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3607" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "NVD", "id": "CVE-2013-3607" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/648646" }, { "trust": 2.5, "url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf" }, { "trust": 1.9, "url": "http://www.supermicro.com/products/nfo/files/ipmi/cve_update.pdf" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/62094" }, { "trust": 1.6, "url": "http://www.supermicro.com/support/faqs/faq.cfm?faq=16536" }, { "trust": 1.4, "url": "https://support.citrix.com/article/ctx216642" }, { "trust": 1.1, "url": "http://www.thomas-krenn.com/en/wiki/supermicro_ipmi_security_updates_november_2013" }, { "trust": 0.8, "url": "http://www.supermicro.com/" }, { "trust": 0.8, "url": "https://www.usenix.org/conference/woot13/illuminating-security-issues-surrounding-lights-out-server-management" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3607" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu96655201/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3607" }, { "trust": 0.8, "url": "http://www.us-cert.gov/ncas/alerts/ta13-207a" }, { "trust": 0.3, "url": "http://www.supermicro.com/about/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3607" }, { "db": "BID", "id": "62094" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "CNNVD", "id": "CNNVD-201308-541" }, { "db": "NVD", "id": "CVE-2013-3607" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#648646" }, { "db": "VULMON", "id": "CVE-2013-3607" }, { "db": "BID", "id": "62094" }, { "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "db": "CNNVD", "id": "CNNVD-201308-541" }, { "db": "NVD", "id": "CVE-2013-3607" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-30T00:00:00", "db": "CERT/CC", "id": "VU#648646" }, { "date": "2013-09-08T00:00:00", "db": "VULMON", "id": "CVE-2013-3607" }, { "date": "2013-08-30T00:00:00", "db": "BID", "id": "62094" }, { "date": "2013-09-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "date": "2013-08-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-541" }, { "date": "2013-09-08T03:17:39.563000", "db": "NVD", "id": "CVE-2013-3607" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-29T00:00:00", "db": "CERT/CC", "id": "VU#648646" }, { "date": "2017-11-15T00:00:00", "db": "VULMON", "id": "CVE-2013-3607" }, { "date": "2016-09-09T15:00:00", "db": "BID", "id": "62094" }, { "date": "2013-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003992" }, { "date": "2013-09-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-541" }, { "date": "2024-11-21T01:53:58.630000", "db": "NVD", "id": "CVE-2013-3607" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-541" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Supermicro IPMI based on ATEN firmware contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#648646" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-541" } ], "trust": 0.6 } }