CVE-2012-2632 (GCVE-0-2012-2632)
Vulnerability from cvelistv5
Published
2012-06-15 19:00
Modified
2024-09-16 17:34
Severity ?
CWE
  • n/a
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2012-000059",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
          },
          {
            "name": "JVN#24646833",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01232.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-15T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2012-000059",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
        },
        {
          "name": "JVN#24646833",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01232.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2012-000059",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
            },
            {
              "name": "JVN#24646833",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01232.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01232.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-2632",
    "datePublished": "2012-06-15T19:00:00Z",
    "dateReserved": "2012-05-14T00:00:00Z",
    "dateUpdated": "2024-09-16T17:34:25.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-2632\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2012-06-15T19:55:01.530\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.\"},{\"lang\":\"es\",\"value\":\"Los routers SEIL con firmware SEIL/x86 1.00 hasta la 2.35, SEIL/X1 2.30 hasta la 3.75, SEIL/X2 2.30 hasta la 3.75, y SEIL/B1 2.30 hasta la 3.75, si las funcionalidades http-proxy y application-gateway est\u00e1n activas, no manejan apropiadamente el comando CONNECT, lo que permite a atacantes remotos evitar las restricciones previstas de URL a trav\u00e9s de una sesi\u00f3n TCP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"363148D7-E3C5-476F-888C-31692F73FC1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A4E9AC-64A9-4585-8889-75B885FA8359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7C5C45-6A98-4DB4-9EC7-6426254CF3AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF3E2DD-A82F-4D27-80AA-57DE4C835E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6322C3D4-0B01-474E-9265-35AF4DD516EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"982534C1-C167-4CBB-A56E-513F356CC994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41399354-E237-4A2A-9B6B-E63B2662E3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C7E15A3-19B8-45E2-B856-8F28CC8C280C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"676E5932-66E5-4FAB-855F-98C5F94A19EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BBC9C8-9C8B-41BD-8BD5-785AC85E1FC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E07EF718-826D-4AC4-8C86-D44A29AA78AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0922B5D6-8B08-42AB-BD3E-DE5F38EFF6EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC6A6EB-9D10-4DB4-B9ED-9D00DEF96EBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"374821DE-C0BE-4C68-8B6C-B4B07EF1C46C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05324D90-B60E-40A2-89C4-B5142C066021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16444EF8-690E-4255-A60E-51D741A8F54E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EBF6C1-A32B-46DC-9612-C2FE1ABF2627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1289B41-28A4-41D3-A092-9F76B1AF6834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA846901-03C5-48C6-8B03-BD8A4E92E251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2180323C-228A-4C29-927E-C19CEE807F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"712DD1DC-4191-4B68-9B9B-E9BDE5B114CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7224DC-86EB-4876-8D8D-B907165D5EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D2D9907-DEA8-445F-9842-538E31DAE63C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51531ED0-3C36-46D1-9F94-66CA9A98964F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB02717B-B93F-4FA6-91ED-18A15ED39529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9492E49-4914-4165-8406-CD409B9533A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE3B68F-B637-4FE4-9942-7D6A0EAE3C92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BED143-E85C-4B8F-8630-35080A911E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15179500-7194-4663-B601-A99468F8E1F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41BECF5-8E3C-464E-B64D-13B61623F83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054CDEC9-4F71-415A-98C8-5D36893A4CE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512BE46D-0D0F-432C-B3D3-F8C43A40945A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BEE6BB-FB53-44C2-B8F6-26028D90ADF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:b1:3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E635DC32-BCA3-40D8-9D53-A216E1A008C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0353B874-9EFA-41E1-9E53-040A4B778D79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E20904-51CE-48E1-A61D-17E13B85D57D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3929172-60B4-4AE0-B80A-290F1F653A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89392531-4DBE-437E-AF7D-3044CA638E86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A26C6C-FF23-41E0-92F0-60BF9E603162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D46283-9927-4116-8B1A-964D90927872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80694620-F1A1-4EAB-8BEF-89FC2D8AA871\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32A7AF0-89D1-4636-9DF4-030607B3E6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBBB00AD-5B6A-4C6A-A55D-741509B8F5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E4BED3-867C-4500-978C-6A1950583C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5FCC542-1794-4923-9C0B-448578E40BB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E011DE1-BC94-4D2A-99FF-097857A28198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23537089-9AEE-43A6-868C-6A14A6E1A1A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAAE376E-9AAB-4FC4-8330-4BE2656EB38F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22DABCCB-7DD9-48FF-9949-219DB1C86AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9699AE15-D7A1-4293-87CD-03382DA26B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD32FB4-D5CA-4B8E-9530-582774920E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD232C0-E29A-4E4A-A705-3DDCAE34649D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8908E10F-DDF6-44E4-A93E-9C2DEA9078DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BCED1B7-5B94-42B6-B831-0A4D0E7C9796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107327B7-5C33-4195-959C-CDA39633C4E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65BE6D4-403C-47B6-8CD3-A88CE8794A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA81178C-ECF1-47F1-977A-8DBAD5AD2528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C507FAEB-9EDD-449A-A22A-754F582023B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDF2F222-3FEA-4D66-953D-2FC297C5F6CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C8340D-C338-400B-B934-42BAECC9C20E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB311CAE-FE73-4FC5-B949-3CAA9D59AFFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290C1676-56DA-472D-9CAD-5B87760974B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1860271-BCDB-448D-8D79-D602FEEC634A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F956482A-BFEC-4285-B85F-11CA56D97AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD2FCCD-AFED-4C14-9C59-13B123385363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6CF63B4-8D0C-40A5-8734-B4988AF8EB4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1EB48B-CEB3-42CA-B3C0-6F0B06789C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x1:3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD398D0C-E533-4EE0-A55E-39A868699867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FF138F-0A19-4D2F-9C7C-12303A533875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7860C101-A585-4D26-8D65-0B04154245C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB8560EC-4A12-4792-BDCB-FA3B8972ED69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B3278B-CA7E-4043-B39B-B6B04605634B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82D58786-6929-4BAB-91B2-67AECCEC65EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E5D48B-E84A-4759-9F87-0EF60352DE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C96023-017B-4880-93CD-75CA522A6107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4267653-44FD-48F2-A838-322295CD2A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09D1A20-52F5-4D80-B00A-C1DF369D72B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E1455D-22CC-41F4-A5BD-63D91EE5C748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1925D84D-569A-4BFB-AE03-18FEA3DDD271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D358F4-8B0B-4812-8CDA-74F3731EA501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C83BE04D-69BC-4F62-A4C1-A65B762476E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD22078-BA28-43A8-8169-F167AD13D905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D20BF2-99E7-4C91-9B51-4E5A5637BED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C889686-9E23-44ED-B376-3932803A4057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30E7E09-A8BB-442F-8CEA-7BCFBE53D48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF9EAFE-8906-404C-BBED-0852FCA82B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429F239F-B545-4FDF-A332-136693E85996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D9D5B9-7048-4933-9657-310FBD1017EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F59D213-0FC6-4C78-8D72-3030738423A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3CC3640-4849-4E4E-A377-93DD27F22184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623908C5-F1DA-45FB-A3C6-6541E40D13A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B400B72-9F2D-43BF-A5BD-63E2B07A4E0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"893FEBFD-CF10-4F27-81C1-8B61462534B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8850E165-5E32-4F86-B77D-158C8529F252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C91A039-AC46-40B8-8106-02ADC3ED44AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C392849-4425-42B9-A384-19F0F9EDD958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66AF10E-4CC5-4BF1-BA9E-EA89B988C7C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E6BAF2-0C3F-4996-8932-673E21C73CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A67D5EA-AEA6-4E29-9B82-499BA54F1319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55AFD5DD-5EAF-4347-B58C-AC7F376DE90F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE96121-D65D-4AD4-B779-EBF243507710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:seil:x2:3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2334DAE0-E647-4395-9CB6-5A42A753C9B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78551AE9-F930-4643-8C63-9A4E6F6AC37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D5515A0-59A3-48D3-886B-1A521C87945D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298A5A1E-0053-4F79-8EC6-CA039172CB9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CDDF455-121C-45ED-8E94-D88271513938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E0C5E1-DD68-4428-BFAC-AC4713CE1D9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDB2021-AC8E-473C-9DEE-08DDC07B3E4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C930C4-B8B4-40A6-BC75-16B1C426EA9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6692E733-DFF0-48FE-95AE-6401F582384C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A3BE6F6-F586-49A1-83BD-D45AB1DAE556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADA6D53-F16E-4BC5-90DA-0CEED1F14B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD875EC-54CE-43D2-9642-B8F6AD94FE82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF099B1-85D3-44A6-9CE0-8436B0D80CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B379EFA5-926B-4E5F-B350-FEB23694244D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCC773D-352E-4B2B-8D0B-9767CA38AD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87ABDD31-2BCE-44EF-81C6-0155B73EC4F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46139215-3BFF-4869-88AA-BAA3BBDE2F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2C2B7C7-501A-42FD-BB10-AB5118B10B74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C381A9EF-B6BC-42BB-A5A4-C199670126F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"197B7157-4122-486B-A306-CA60D3F546FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A707B39-F82A-47EF-A35A-CC87C63A948B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D870A8-EA7E-44C7-9277-37413BFA3FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E7133D-17A5-43B3-8E56-9E6082C1CAB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A75EB6A-FE34-4A15-86F6-7AC14BAC956C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DBE0714-B263-4642-8A65-C96FCCDBA3F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5985C29-C438-45C8-B824-8EFD67FC6B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"720C7F1E-C3B8-4D73-8470-197074C3D344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27FFE1C2-EB16-494C-BB15-7CC2799AABF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84DECA7D-1D49-4FB5-91C9-2345948544D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABA94CE8-D10E-4740-959F-91A0D26BB613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97F9240-6168-492B-9357-C750281FC6F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A521DC6-D80C-46B3-8C60-364FD411B792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040FF640-1303-4EDB-A356-9C1C8B23DE64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4537E1A-EC42-47BB-987E-8DA9F57F1FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:b1_firmware:3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FF343DB-D6D0-48A9-9225-56AFA6C632D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:x86_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAEE5507-E177-41CC-B95F-1003CF795DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:seil:x86_firmware:1.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFF5DBD-22A3-4111-A7C8-98AE409B839C\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN24646833/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://www.seil.jp/support/security/a01232.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN24646833/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.seil.jp/support/security/a01232.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…