Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-3607 (GCVE-0-2013-3607)
Vulnerability from cvelistv5 – Published: 2013-09-08 01:00 – Updated: 2024-08-06 16:14- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:14:56.531Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62094",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/62094"
},
{
"name": "VU#648646",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX216642"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-14T10:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "62094",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/62094"
},
{
"name": "VU#648646",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX216642"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3607",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62094",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62094"
},
{
"name": "VU#648646",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf",
"refsource": "CONFIRM",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf",
"refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013",
"refsource": "MISC",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX216642"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2013-3607",
"datePublished": "2013-09-08T01:00:00",
"dateReserved": "2013-05-21T00:00:00",
"dateUpdated": "2024-08-06T16:14:56.531Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-3607\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2013-09-08T03:17:39.563\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi.\"},{\"lang\":\"es\",\"value\":\"Multiples desbordamientos de buffer basados en pila en la interfaz web de la implementaci\u00f3n de Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, y X9SR* permite a atacantes remotos ejecutar c\u00f3digo arbitrario en el Baseboard Management Controller (BMC), como se muestra en el campo de (1) usuario o (2) contrase\u00f1a en login.cgi.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F574AF-FC1C-453C-A8FB-C11F42ED8E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B966320-9479-48D4-9C08-0C5BC655588D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"502A47AC-064C-49FE-AC9C-50D0C1B62DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"797EFABC-8823-4B42-8FA1-A26CF406166B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978262CA-7C6A-4F3D-9480-A08230E30EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F113C555-5E90-4458-9C30-79C3EBB8E917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8551A73-5B20-44D5-BC9C-11F18F40C055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEBE2CB-7349-4A9A-838F-7E4220BF74E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39DEF117-ED63-42DF-A4E6-0A019BE82968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAA5397-D28D-4817-AC21-F0D0DEA95489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgu-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CCF563E-6A20-4F99-80FB-1BED5149E8C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB097280-76E6-4DBE-BD2F-DDE3C9DBD734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36ACA455-CB46-4B0E-9F5B-86508907323C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A159DCC-D2F7-4409-B842-027100794679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34630C1-5B6A-46BD-BD0A-A1DED08003E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A5024C-F341-4DD6-ABCF-B9259937732C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C09A30A7-C88C-4365-8D24-BFAB1EEF53F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D060E9B-0967-49E1-958B-B4557BC2634A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6596C3C0-9DAC-43AF-9185-51E16096BAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05C4617-F33D-40F0-8271-C4FE1578BAF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FF4ECC2-7EF8-4150-AB45-D30B88BE884C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61EB064B-5A03-4D54-BB55-15AA35B44668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spt-df-d525\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8C8686-ABA2-466F-8309-D483F128CE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82B90F8-3E33-47E5-8D65-92BF39E7091D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35FD83D9-1F28-454F-9221-9CF69F8730E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtn\\\\+-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EA3F5D-38B1-4D3F-BA3B-C03598124119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtn\\\\+-f-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD772BE-13CE-48F7-A24F-28825060561E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C38C112C-52D0-4D29-8FF6-298AD01B981C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6f\\\\+-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D46200-C176-49FE-AB45-CD1706355A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95798443-906A-445B-8CB7-9FAE8223AAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6tf\\\\+-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82286D8E-632D-440A-BF94-94331B195222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24D640B1-0DED-4CF0-AD43-AFFEBE953157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-ln4f\\\\+-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736B9BD0-E764-4321-A1A5-C8875147F701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0490EB39-70EA-494C-855C-6698B65421FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DB343D9-AA39-4837-AE84-CF8EC50B758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65D600FF-CA39-40C0-8535-E39971E5C34A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E690BCC-685E-4A3C-9F30-C0429B6591FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672B902B-C4B1-4E10-AE16-34C562029D1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BE8D56-4810-470E-B284-CCD1D92736F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45003169-49AF-4CA0-8E44-0137476D0352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F84B957-6385-4533-B8B0-B252B695721A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A977F207-190D-48ED-AC31-A9D500114F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F77C1AD-12C9-492B-82B9-A5469182FEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B111BB68-F4D3-471D-8B99-EE4AED27974A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2D975-2AEF-4083-820D-356D846DDC59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6499489-EFEA-4C8E-B5F5-56F92DF25F2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03A480E-8EE9-4040-B1C6-3E60EBD010BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB68F879-2E55-4D12-8259-13C37004FB33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5D8C2C-683C-4670-9878-B879AAABD54D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F818CA-1CB3-48B2-BED0-99C09A6F8259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4401E676-3E1D-431E-ABAF-89BC9CAC64D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C27D83-5E57-4B7B-B765-B41AAA004C74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr3-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1E2A1-71CA-48F0-8A91-E0AD896D4106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77777CE0-0095-4318-A194-D14CF4D699CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC43CCB5-7842-4BD3-B2DB-597815E129CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr7-tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"767854D0-2DE0-4628-B6D7-18161F471718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2EF8A1A-3BBC-44DB-8469-14B71495E8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4102B60-86D2-42AC-86A9-0F690CDA0970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"097802C6-25DA-4D55-84E7-10B4E5CC59F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C269C6-B569-493E-8D29-CE16C03CCA4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA6459A-758D-46D4-89F4-E4DE71FF48E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dre-tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0853B35-F437-41D3-8126-0C51A788CDCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F263B5-4723-4153-A751-78F539A3C64A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B9DE20-58F4-4EED-950F-FF8E07313D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE8879B-78B1-4372-BD32-C09B6EE083DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7g\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F26B68A6-66A9-4272-B6AE-ADCF0DE1733E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7t\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7tg\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56CCB73-97FB-4F81-8D9E-2F441364AD22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-i\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77595EF-70F4-41DD-85CF-D866AA4B3988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-ig\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6BEBA8-B432-45BB-8756-AFC6123404B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-it\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98461CD-D04C-4C72-9F44-EEF0A5C60D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-itg\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C18651-C28F-459B-B055-A01EE6E81A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E124B14-05FE-48AB-9364-48EC03276569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D244DE-3A8D-40AF-8151-21886264F62D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-hf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F154DE4-6D89-46ED-A32D-FB6DA29908B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"165E5734-ED3F-4EF8-9737-BF0BA8FD45D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-htf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E9B93D2-0F82-410E-8936-CCEDD25E7B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F60960-266E-487C-8F07-4498A6E3EA77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D477E3-C042-47EE-B43F-03FF4903E2C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"496EED07-44EA-4E2A-8846-74227DB432A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC056CAA-FE35-48DF-864E-3457E9ED6B4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dri-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29B97C2-5B79-4743-B5AF-77D674835E8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F84B46-E273-44A6-A89D-4E5E47BDAFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3621F0A-8C0A-4CB3-A1F3-A7416794D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA297408-C2FB-45B6-894E-0D491F2E541C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10283C29-ABEF-416A-A45D-BE7EFBB6891E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4B20A3D-E691-4870-953C-5F85CAB5B3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C88C46-1716-4E4C-8C2A-AC21697E31AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"363937AB-EBBD-466D-A9FA-CD70B083D806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-hf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50932978-66A9-4F67-92D1-35E7FA9B4653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DE585E-EEBE-4DB2-AF04-16038E8B2A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-3ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683BBAE2-89D5-4241-A981-8D7A9D8ECB9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-3tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7437EDE5-2D70-4A46-B749-2CF13FD1B86B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-7tpf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697C2608-7FD5-4A5B-8E09-1A68DDEBA73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-itpf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5D8E27-2613-4004-ACE4-B7F8643F7095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drx\\\\+-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F94922A-A450-4D24-83BB-C3A55CC803D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"096BE775-0410-4143-AA3C-DE2F70753802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qr7-tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47A44372-6B5E-4DB5-AD22-97B80475048B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B5AF2A-069C-4D87-89E5-11A4CE544F27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84CF273B-3845-48D3-824E-6898ABD4FC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qri-f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAEE806-A1B6-40C8-BBA6-61AB180E3276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D19365C-7125-4EA9-A8EF-02A02ACF85A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA2CE72-088B-4CA6-894D-427CC4F2B6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2682D17-6376-4724-B434-0989FC2221A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scl\\\\+-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E984C99-B5D5-489D-8E90-5472210686BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C21D472-2364-4809-89B7-651CA25123BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5FCB9C0-8665-4850-A01C-0D1C47F34DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002C6967-4CCC-43B9-A687-B9B21533098E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138F57C5-269C-4963-80EA-F1F08AB4B6D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09BF315-D3D9-46C7-8FED-C24496FF57CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBDDAAF7-FA47-41E5-8722-08AAE9049C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26AE08D-9A49-4E92-A1A9-81502BE94B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A87A49-9B28-49EF-ABC3-2A69FB39C0D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3047CD31-5589-4030-B31A-3E4EDF251986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC06352-2CB3-472C-BE76-A6995415EF47\"}]}]}],\"references\":[{\"url\":\"http://www.kb.cert.org/vuls/id/648646\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/62094\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013\",\"source\":\"cret@cert.org\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/648646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/62094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
}
}
VAR-201309-0235
Vulnerability from variot - Updated: 2025-04-11 22:53Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi. Supermicro IPMI is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code in the context of the device that uses the affected interface. Failed exploit attempts will likely crash the device
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201309-0235",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "x9sri-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sre-3f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sre-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9spu-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scm-iif",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srl-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srg-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srd-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srw-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sri-3f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hlibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgu-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7g\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9db3-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-h6ibff",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-ig\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-htf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgu-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sia-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-itf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spt-df-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtn\\+-f-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-ibff",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-7tf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgi-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sme-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qri-f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sca-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hlf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scl-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sit-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-itpf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dct-hln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qr7-tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-3ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8scm-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drl-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr3-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-7f-hft",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-h6f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-7ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9db3-tpf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sit-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8siu-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dct-ibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7tg\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-7",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-7f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sil-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6tf\\+-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr7-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbu-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr7-tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sgl-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-i\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgg-qf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6f\\+-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drl-ef",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-h6ibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dri-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sce-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtl-6f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-hf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sci-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-ef",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scd-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spa-hf-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-7ln4f-jbod",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dcl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-ln4f\\+-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dri-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr7-ln4f-jbod",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qr7-tf-jbod",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-itg\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scl\\+-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbi-tpf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbu-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7t\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbl-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drx\\+-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-7f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-hf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dg6-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spe-h-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spe-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sie-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-if-hft",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-itf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dre-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scm-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-7f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drfr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spe-hf-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-it\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qr7-tf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-3tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dcl-6f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-htf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-7tpf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sie-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dre-tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbi-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scff-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sbaa-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtn\\+-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtl-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qri-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-7jln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dct-hibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spa-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spt-df-d525\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-i",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr3-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8si6-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-7tf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-ibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dcl-6f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dcl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dct-hibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dct-hln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dct-ibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dg6-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgg-qf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgi-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hlf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hlibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgu-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgu-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8scm-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sgl-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sme-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-7",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-7f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-i",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spa-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spa-hf-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spe-h-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spe-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spe-hf-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spt-df-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spt-df-d525+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtl-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtl-6f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtn+-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtn+-f-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6f+-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6tf+-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-ln4f+-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8si6-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sia-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sie-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sie-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sil-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sit-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sit-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8siu-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-7f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-7f-hft",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-7tf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-if-hft",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-itf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9db3-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9db3-tpf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbi-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbi-tpf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbl-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbu-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbu-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr3-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr3-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr7-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr7-ln4f-jbod",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr7-tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-7jln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-7ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-7ln4f-jbod",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-ef",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dre-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dre-tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7g+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7t+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7tg+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-i+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-ig+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-it+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-itg+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drfr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-hf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-htf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-htf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-7f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-7tf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-itf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dri-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dri-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drl-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drl-ef",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-h6f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-h6ibff",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-h6ibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-hf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-ibff",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-ibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-3ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-3tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-7tpf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-itpf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drx+-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qr7-tf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qr7-tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qr7-tf-jbod",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qri-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qri-f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sbaa-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sca-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scd-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sce-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scff-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sci-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scl+-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scl-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scm-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scm-iif",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9spu-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srd-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sre-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sre-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srg-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sri-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sri-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srl-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srw-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "micro computer supermicro x9srl-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sri-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sri-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9srg-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sre-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sre-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9srd-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9spu-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scm-iif",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scm-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scl-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scl+-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sci-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scff-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sce-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scd-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sca-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sbaa-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qri-f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qri-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qr7-tf-jbod",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qr7-tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qr7-tf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drx+-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-itpf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-7tpf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-3tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-3ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-ibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-ibff",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-hf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-h6ibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-h6ibff",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-h6f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drl-ef",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drl-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dri-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dri-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-itf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-7tf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-7f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-htf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-htf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-hf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drfr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-itg+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-it+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-ig+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-i+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7tg+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7t+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7g+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dre-tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dre-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-ef",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-7ln4f-jbod",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-7ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-7jln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr7-tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr7-ln4f-jbod",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr7-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr3-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr3-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbu-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbu-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbl-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbi-tpf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbi-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9db3-tpf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9db3-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-itf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-if-hft",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-7tf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-7f-hft",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-7f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8siu-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sit-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sit-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sil-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sie-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sie-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sia-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8si6-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-ln4f+-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6tf+-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6f+-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtn+-f-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtn+-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtl-6f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtl-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spt-df-d525+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spt-df-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spe-hf-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spe-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spe-h-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spa-hf-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spa-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-i",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-7f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-7",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sme-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sgl-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8scm-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgu-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgu-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hlibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hlf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgi-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgg-qf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dg6-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-ibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-hln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-hibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dcl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dcl-6f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "netscaler t1",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "netscaler service delivery appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "netscaler gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "netscaler application delivery controller",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "command center appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "cloudbridge",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "BID",
"id": "62094"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:supermicro:h8dcl-6f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dcl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dct-hibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dct-hln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dct-ibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dg6-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgg-qf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgi-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hlf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hlibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgu-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgu-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8scm-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sgl-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sme-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-7f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-i",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spa-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spa-hf-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spe-h-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spe-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spe-hf-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtl-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtl-6f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8si6-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sia-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sie-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sie-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sil-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sit-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sit-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8siu-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-7f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-7f-hft",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-7tf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-if-hft",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-itf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9db3-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9db3-tpf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbi-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbi-tpf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbl-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbu-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbu-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr3-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr3-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f-jbod",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr7-tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-7jln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f-jbod",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-ef",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dre-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dre-tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7g%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7t%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7tg%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-i%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-ig%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-it%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-itg%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drfr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-hf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-htf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-htf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-7f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-7tf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-itf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dri-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dri-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drl-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drl-ef",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-h6f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibff",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-hf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-ibff",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-ibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-3ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-3tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-7tpf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-itpf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drx%2b-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qr7-tf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qr7-tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qr7-tf-jbod",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qri-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qri-f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sbaa-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sca-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scd-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sce-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scff-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sci-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scl%2b-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scl-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scm-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scm-iif",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9spu-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srd-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sre-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sre-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srg-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sri-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sri-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srl-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srw-f",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "J. Alex Halderman",
"sources": [
{
"db": "BID",
"id": "62094"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
}
],
"trust": 0.9
},
"cve": "CVE-2013-3607",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-3607",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-3607",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2013-3607",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201308-541",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULMON",
"id": "CVE-2013-3607",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi. Supermicro IPMI is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. \nAn attacker can exploit these issues to execute arbitrary code in the context of the device that uses the affected interface. Failed exploit attempts will likely crash the device",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3607"
},
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "BID",
"id": "62094"
},
{
"db": "VULMON",
"id": "CVE-2013-3607"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#648646",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2013-3607",
"trust": 2.8
},
{
"db": "BID",
"id": "62094",
"trust": 2.0
},
{
"db": "JVN",
"id": "JVNVU96655201",
"trust": 0.8
},
{
"db": "USCERT",
"id": "TA13-207A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2013-3607",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"db": "BID",
"id": "62094"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"id": "VAR-201309-0235",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.225
},
"last_update_date": "2025-04-11T22:53:15.862000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.supermicro.com.tw/index_home.cfm"
},
{
"title": "Firmware Fixes to Common Vulnerabilities and Exposures",
"trust": 0.8,
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.9,
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"trust": 2.5,
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"trust": 1.9,
"url": "http://www.supermicro.com/products/nfo/files/ipmi/cve_update.pdf"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/62094"
},
{
"trust": 1.6,
"url": "http://www.supermicro.com/support/faqs/faq.cfm?faq=16536"
},
{
"trust": 1.4,
"url": "https://support.citrix.com/article/ctx216642"
},
{
"trust": 1.1,
"url": "http://www.thomas-krenn.com/en/wiki/supermicro_ipmi_security_updates_november_2013"
},
{
"trust": 0.8,
"url": "http://www.supermicro.com/"
},
{
"trust": 0.8,
"url": "https://www.usenix.org/conference/woot13/illuminating-security-issues-surrounding-lights-out-server-management"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3607"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu96655201/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3607"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/ncas/alerts/ta13-207a"
},
{
"trust": 0.3,
"url": "http://www.supermicro.com/about/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"db": "BID",
"id": "62094"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"db": "BID",
"id": "62094"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-30T00:00:00",
"db": "CERT/CC",
"id": "VU#648646"
},
{
"date": "2013-09-08T00:00:00",
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"date": "2013-08-30T00:00:00",
"db": "BID",
"id": "62094"
},
{
"date": "2013-09-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"date": "2013-08-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"date": "2013-09-08T03:17:39.563000",
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-07-29T00:00:00",
"db": "CERT/CC",
"id": "VU#648646"
},
{
"date": "2017-11-15T00:00:00",
"db": "VULMON",
"id": "CVE-2013-3607"
},
{
"date": "2016-09-09T15:00:00",
"db": "BID",
"id": "62094"
},
{
"date": "2013-12-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003992"
},
{
"date": "2013-09-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-541"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-3607"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Supermicro IPMI based on ATEN firmware contain multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-541"
}
],
"trust": 0.6
}
}
CERTFR-2016-AVI-303
Vulnerability from certfr_avis - Published: 2016-09-09 - Updated: 2016-09-09
De multiples vulnérabilités ont été corrigées dans les produits Citrix. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | XenServer | Citrix XenServer version 6.0 sans le correctif de sécurité XS60E063 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.39 pour solutions matérielles embarquées NetScaler MPX/SDX de type 11500/13500/14500/16500/18500/20500, 115xx, 17550/19550/20550/21550 et T1110, ainsi que CloudBridge CB4000 et CB5000 | ||
| Citrix | XenServer | Citrix XenServer version 6.2 SP1 sans le correctif de sécurité XS62ESP1048 | ||
| Citrix | XenServer | Citrix XenServer version 6.1 sans le correctif de sécurité XS61E073 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 4.08 pour solutions matérielles embarquées NetScaler MPX/SDX de type 14xxx, 25xxx, T1120 et T1300 | ||
| Citrix | XenServer | Citrix XenServer version 6.0.2 Common Criteria sans le correctif de sécurité XS602ECC034 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.21 pour solutions matérielles embarquées NetScaler MPX/SDX de type 8xxx et T1010, ainsi que CloudBridge CB2000 et CB3000 | ||
| Citrix | XenServer | Citrix XenServer version 6.0.2 sans le correctif de sécurité XS602E057 | ||
| Citrix | XenServer | Citrix XenServer version 6.5 SP1 sans le correctif de sécurité XS65ESP1038 | ||
| Citrix | XenServer | Citrix XenServer version 7.0 sans le correctif de sécurité XS70E012 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.24 pour solutions matérielles embarquées NetScaler de type 22xxx et T1200 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer version 6.0 sans le correctif de s\u00e9curit\u00e9 XS60E063",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.39 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 11500/13500/14500/16500/18500/20500, 115xx, 17550/19550/20550/21550 et T1110, ainsi que CloudBridge CB4000 et CB5000",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.2 SP1 sans le correctif de s\u00e9curit\u00e9 XS62ESP1048",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.1 sans le correctif de s\u00e9curit\u00e9 XS61E073",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 4.08 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 14xxx, 25xxx, T1120 et T1300",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.0.2 Common Criteria sans le correctif de s\u00e9curit\u00e9 XS602ECC034",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.21 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 8xxx et T1010, ainsi que CloudBridge CB2000 et CB3000",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.0.2 sans le correctif de s\u00e9curit\u00e9 XS602E057",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.5 SP1 sans le correctif de s\u00e9curit\u00e9 XS65ESP1038",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 7.0 sans le correctif de s\u00e9curit\u00e9 XS70E012",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.24 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler de type 22xxx et T1200",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2016-7094",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7094"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2013-4434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4434"
},
{
"name": "CVE-2014-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3570"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2016-7093",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7093"
},
{
"name": "CVE-2014-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3509"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2014-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2016-7154",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7154"
},
{
"name": "CVE-2013-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3619"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2013-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3622"
},
{
"name": "CVE-2014-3511",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3511"
},
{
"name": "CVE-2014-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3568"
},
{
"name": "CVE-2016-7092",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7092"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2013-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4421"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2013-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3608"
},
{
"name": "CVE-2014-8275",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8275"
},
{
"name": "CVE-2015-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0205"
},
{
"name": "CVE-2013-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3620"
},
{
"name": "CVE-2013-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3609"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2014-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3572"
},
{
"name": "CVE-2014-3508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3508"
},
{
"name": "CVE-2014-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3569"
},
{
"name": "CVE-2013-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3607"
},
{
"name": "CVE-2013-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3621"
},
{
"name": "CVE-2013-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3623"
}
],
"initial_release_date": "2016-09-09T00:00:00",
"last_revision_date": "2016-09-09T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-303",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-09-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Citrix\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX216071 du 08 septembre 2016",
"url": "http://support.citrix.com/article/CTX216071"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX216642 du 08 septembre 2016",
"url": "http://support.citrix.com/article/CTX216642"
}
]
}
FKIE_CVE-2013-3607
Vulnerability from fkie_nvd - Published: 2013-09-08 03:17 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23F574AF-FC1C-453C-A8FB-C11F42ED8E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B966320-9479-48D4-9C08-0C5BC655588D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "502A47AC-064C-49FE-AC9C-50D0C1B62DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797EFABC-8823-4B42-8FA1-A26CF406166B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978262CA-7C6A-4F3D-9480-A08230E30EB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F113C555-5E90-4458-9C30-79C3EBB8E917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8551A73-5B20-44D5-BC9C-11F18F40C055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEBE2CB-7349-4A9A-838F-7E4220BF74E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39DEF117-ED63-42DF-A4E6-0A019BE82968",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAA5397-D28D-4817-AC21-F0D0DEA95489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CCF563E-6A20-4F99-80FB-1BED5149E8C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB097280-76E6-4DBE-BD2F-DDE3C9DBD734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36ACA455-CB46-4B0E-9F5B-86508907323C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A159DCC-D2F7-4409-B842-027100794679",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A34630C1-5B6A-46BD-BD0A-A1DED08003E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38A5024C-F341-4DD6-ABCF-B9259937732C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C09A30A7-C88C-4365-8D24-BFAB1EEF53F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D060E9B-0967-49E1-958B-B4557BC2634A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6596C3C0-9DAC-43AF-9185-51E16096BAEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05C4617-F33D-40F0-8271-C4FE1578BAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF4ECC2-7EF8-4150-AB45-D30B88BE884C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61EB064B-5A03-4D54-BB55-15AA35B44668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8C8686-ABA2-466F-8309-D483F128CE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C82B90F8-3E33-47E5-8D65-92BF39E7091D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35FD83D9-1F28-454F-9221-9CF69F8730E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47EA3F5D-38B1-4D3F-BA3B-C03598124119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD772BE-13CE-48F7-A24F-28825060561E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C38C112C-52D0-4D29-8FF6-298AD01B981C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D46200-C176-49FE-AB45-CD1706355A56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95798443-906A-445B-8CB7-9FAE8223AAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82286D8E-632D-440A-BF94-94331B195222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24D640B1-0DED-4CF0-AD43-AFFEBE953157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736B9BD0-E764-4321-A1A5-C8875147F701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0490EB39-70EA-494C-855C-6698B65421FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB343D9-AA39-4837-AE84-CF8EC50B758A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65D600FF-CA39-40C0-8535-E39971E5C34A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E690BCC-685E-4A3C-9F30-C0429B6591FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "672B902B-C4B1-4E10-AE16-34C562029D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BE8D56-4810-470E-B284-CCD1D92736F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45003169-49AF-4CA0-8E44-0137476D0352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F84B957-6385-4533-B8B0-B252B695721A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A977F207-190D-48ED-AC31-A9D500114F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F77C1AD-12C9-492B-82B9-A5469182FEEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B111BB68-F4D3-471D-8B99-EE4AED27974A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39C2D975-2AEF-4083-820D-356D846DDC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6499489-EFEA-4C8E-B5F5-56F92DF25F2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03A480E-8EE9-4040-B1C6-3E60EBD010BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB68F879-2E55-4D12-8259-13C37004FB33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5D8C2C-683C-4670-9878-B879AAABD54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F818CA-1CB3-48B2-BED0-99C09A6F8259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4401E676-3E1D-431E-ABAF-89BC9CAC64D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C27D83-5E57-4B7B-B765-B41AAA004C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1E2A1-71CA-48F0-8A91-E0AD896D4106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77777CE0-0095-4318-A194-D14CF4D699CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC43CCB5-7842-4BD3-B2DB-597815E129CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767854D0-2DE0-4628-B6D7-18161F471718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EF8A1A-3BBC-44DB-8469-14B71495E8AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4102B60-86D2-42AC-86A9-0F690CDA0970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*",
"matchCriteriaId": "097802C6-25DA-4D55-84E7-10B4E5CC59F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56C269C6-B569-493E-8D29-CE16C03CCA4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA6459A-758D-46D4-89F4-E4DE71FF48E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0853B35-F437-41D3-8126-0C51A788CDCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08F263B5-4723-4153-A751-78F539A3C64A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B9DE20-58F4-4EED-950F-FF8E07313D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE8879B-78B1-4372-BD32-C09B6EE083DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F26B68A6-66A9-4272-B6AE-ADCF0DE1733E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C56CCB73-97FB-4F81-8D9E-2F441364AD22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D77595EF-70F4-41DD-85CF-D866AA4B3988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6BEBA8-B432-45BB-8756-AFC6123404B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E98461CD-D04C-4C72-9F44-EEF0A5C60D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C18651-C28F-459B-B055-A01EE6E81A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E124B14-05FE-48AB-9364-48EC03276569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19D244DE-3A8D-40AF-8151-21886264F62D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F154DE4-6D89-46ED-A32D-FB6DA29908B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "165E5734-ED3F-4EF8-9737-BF0BA8FD45D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9B93D2-0F82-410E-8936-CCEDD25E7B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58F60960-266E-487C-8F07-4498A6E3EA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09D477E3-C042-47EE-B43F-03FF4903E2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "496EED07-44EA-4E2A-8846-74227DB432A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC056CAA-FE35-48DF-864E-3457E9ED6B4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D29B97C2-5B79-4743-B5AF-77D674835E8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86F84B46-E273-44A6-A89D-4E5E47BDAFAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3621F0A-8C0A-4CB3-A1F3-A7416794D185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA297408-C2FB-45B6-894E-0D491F2E541C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10283C29-ABEF-416A-A45D-BE7EFBB6891E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B20A3D-E691-4870-953C-5F85CAB5B3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40C88C46-1716-4E4C-8C2A-AC21697E31AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "363937AB-EBBD-466D-A9FA-CD70B083D806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50932978-66A9-4F67-92D1-35E7FA9B4653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08DE585E-EEBE-4DB2-AF04-16038E8B2A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "683BBAE2-89D5-4241-A981-8D7A9D8ECB9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7437EDE5-2D70-4A46-B749-2CF13FD1B86B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697C2608-7FD5-4A5B-8E09-1A68DDEBA73E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D5D8E27-2613-4004-ACE4-B7F8643F7095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F94922A-A450-4D24-83BB-C3A55CC803D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "096BE775-0410-4143-AA3C-DE2F70753802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A44372-6B5E-4DB5-AD22-97B80475048B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91B5AF2A-069C-4D87-89E5-11A4CE544F27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84CF273B-3845-48D3-824E-6898ABD4FC53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAEE806-A1B6-40C8-BBA6-61AB180E3276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D19365C-7125-4EA9-A8EF-02A02ACF85A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA2CE72-088B-4CA6-894D-427CC4F2B6E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2682D17-6376-4724-B434-0989FC2221A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E984C99-B5D5-489D-8E90-5472210686BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C21D472-2364-4809-89B7-651CA25123BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5FCB9C0-8665-4850-A01C-0D1C47F34DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*",
"matchCriteriaId": "002C6967-4CCC-43B9-A687-B9B21533098E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "138F57C5-269C-4963-80EA-F1F08AB4B6D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B09BF315-D3D9-46C7-8FED-C24496FF57CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBDDAAF7-FA47-41E5-8722-08AAE9049C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26AE08D-9A49-4E92-A1A9-81502BE94B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08A87A49-9B28-49EF-ABC3-2A69FB39C0D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3047CD31-5589-4030-B31A-3E4EDF251986",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC06352-2CB3-472C-BE76-A6995415EF47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi."
},
{
"lang": "es",
"value": "Multiples desbordamientos de buffer basados en pila en la interfaz web de la implementaci\u00f3n de Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, y X9SR* permite a atacantes remotos ejecutar c\u00f3digo arbitrario en el Baseboard Management Controller (BMC), como se muestra en el campo de (1) usuario o (2) contrase\u00f1a en login.cgi."
}
],
"id": "CVE-2013-3607",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-09-08T03:17:39.563",
"references": [
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"source": "cret@cert.org",
"url": "http://www.securityfocus.com/bid/62094"
},
{
"source": "cret@cert.org",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"source": "cret@cert.org",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"source": "cret@cert.org",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"source": "cret@cert.org",
"tags": [
"Exploit"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/62094"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2013-3607
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-3607",
"description": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi.",
"id": "GSD-2013-3607"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-3607"
],
"details": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi.",
"id": "GSD-2013-3607",
"modified": "2023-12-13T01:22:22.482160Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3607",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62094",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62094"
},
{
"name": "VU#648646",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf",
"refsource": "CONFIRM",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf",
"refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013",
"refsource": "MISC",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX216642"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3607"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#648646",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013",
"refsource": "MISC",
"tags": [],
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"name": "62094",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/62094"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.citrix.com/article/CTX216642"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-11-15T02:29Z",
"publishedDate": "2013-09-08T03:17Z"
}
}
}
GHSA-P6CP-W5H4-4H2M
Vulnerability from github – Published: 2022-05-17 00:24 – Updated: 2022-05-17 00:24Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi.
{
"affected": [],
"aliases": [
"CVE-2013-3607"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-09-08T03:17:00Z",
"severity": "HIGH"
},
"details": "Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi.",
"id": "GHSA-p6cp-w5h4-4h2m",
"modified": "2022-05-17T00:24:32Z",
"published": "2022-05-17T00:24:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3607"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"type": "WEB",
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/62094"
},
{
"type": "WEB",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"type": "WEB",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.