Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-3609 (GCVE-0-2013-3609)
Vulnerability from cvelistv5 – Published: 2013-09-08 01:00 – Updated: 2024-08-06 16:14- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:14:56.568Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62098",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/62098"
},
{
"name": "VU#648646",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX216642"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-14T10:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "62098",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/62098"
},
{
"name": "VU#648646",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX216642"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3609",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62098",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62098"
},
{
"name": "VU#648646",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf",
"refsource": "CONFIRM",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf",
"refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013",
"refsource": "MISC",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX216642"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2013-3609",
"datePublished": "2013-09-08T01:00:00",
"dateReserved": "2013-05-21T00:00:00",
"dateUpdated": "2024-08-06T16:14:56.568Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-3609\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2013-09-08T03:17:39.603\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.\"},{\"lang\":\"es\",\"value\":\"La interfaz web en la implementaci\u00f3n Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F y X9SR* confie en el c\u00f3digo JavaScript en el cliente para comprobaciones de autorizaci\u00f3n, lo que permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso a trav\u00e9s de una solicitud manipulada, relacionado con la funci\u00f3n PrivilegeCallBack.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F574AF-FC1C-453C-A8FB-C11F42ED8E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B966320-9479-48D4-9C08-0C5BC655588D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"502A47AC-064C-49FE-AC9C-50D0C1B62DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"797EFABC-8823-4B42-8FA1-A26CF406166B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978262CA-7C6A-4F3D-9480-A08230E30EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F113C555-5E90-4458-9C30-79C3EBB8E917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8551A73-5B20-44D5-BC9C-11F18F40C055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEBE2CB-7349-4A9A-838F-7E4220BF74E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39DEF117-ED63-42DF-A4E6-0A019BE82968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAA5397-D28D-4817-AC21-F0D0DEA95489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8dgu-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CCF563E-6A20-4F99-80FB-1BED5149E8C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB097280-76E6-4DBE-BD2F-DDE3C9DBD734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36ACA455-CB46-4B0E-9F5B-86508907323C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A159DCC-D2F7-4409-B842-027100794679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34630C1-5B6A-46BD-BD0A-A1DED08003E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A5024C-F341-4DD6-ABCF-B9259937732C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C09A30A7-C88C-4365-8D24-BFAB1EEF53F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D060E9B-0967-49E1-958B-B4557BC2634A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6596C3C0-9DAC-43AF-9185-51E16096BAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05C4617-F33D-40F0-8271-C4FE1578BAF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FF4ECC2-7EF8-4150-AB45-D30B88BE884C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61EB064B-5A03-4D54-BB55-15AA35B44668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x7spt-df-d525\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8C8686-ABA2-466F-8309-D483F128CE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82B90F8-3E33-47E5-8D65-92BF39E7091D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35FD83D9-1F28-454F-9221-9CF69F8730E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtn\\\\+-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EA3F5D-38B1-4D3F-BA3B-C03598124119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtn\\\\+-f-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD772BE-13CE-48F7-A24F-28825060561E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C38C112C-52D0-4D29-8FF6-298AD01B981C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6f\\\\+-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D46200-C176-49FE-AB45-CD1706355A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95798443-906A-445B-8CB7-9FAE8223AAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-6tf\\\\+-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82286D8E-632D-440A-BF94-94331B195222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24D640B1-0DED-4CF0-AD43-AFFEBE953157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8dtu-ln4f\\\\+-lr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736B9BD0-E764-4321-A1A5-C8875147F701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0490EB39-70EA-494C-855C-6698B65421FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DB343D9-AA39-4837-AE84-CF8EC50B758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65D600FF-CA39-40C0-8535-E39971E5C34A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E690BCC-685E-4A3C-9F30-C0429B6591FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672B902B-C4B1-4E10-AE16-34C562029D1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BE8D56-4810-470E-B284-CCD1D92736F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45003169-49AF-4CA0-8E44-0137476D0352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F84B957-6385-4533-B8B0-B252B695721A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A977F207-190D-48ED-AC31-A9D500114F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F77C1AD-12C9-492B-82B9-A5469182FEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B111BB68-F4D3-471D-8B99-EE4AED27974A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2D975-2AEF-4083-820D-356D846DDC59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6499489-EFEA-4C8E-B5F5-56F92DF25F2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03A480E-8EE9-4040-B1C6-3E60EBD010BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB68F879-2E55-4D12-8259-13C37004FB33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5D8C2C-683C-4670-9878-B879AAABD54D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F818CA-1CB3-48B2-BED0-99C09A6F8259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4401E676-3E1D-431E-ABAF-89BC9CAC64D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C27D83-5E57-4B7B-B765-B41AAA004C74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr3-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1E2A1-71CA-48F0-8A91-E0AD896D4106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77777CE0-0095-4318-A194-D14CF4D699CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC43CCB5-7842-4BD3-B2DB-597815E129CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dr7-tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"767854D0-2DE0-4628-B6D7-18161F471718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2EF8A1A-3BBC-44DB-8469-14B71495E8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4102B60-86D2-42AC-86A9-0F690CDA0970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"097802C6-25DA-4D55-84E7-10B4E5CC59F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C269C6-B569-493E-8D29-CE16C03CCA4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA6459A-758D-46D4-89F4-E4DE71FF48E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dre-tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0853B35-F437-41D3-8126-0C51A788CDCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F263B5-4723-4153-A751-78F539A3C64A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B9DE20-58F4-4EED-950F-FF8E07313D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE8879B-78B1-4372-BD32-C09B6EE083DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7g\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F26B68A6-66A9-4272-B6AE-ADCF0DE1733E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7t\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-7tg\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56CCB73-97FB-4F81-8D9E-2F441364AD22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-i\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77595EF-70F4-41DD-85CF-D866AA4B3988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-ig\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6BEBA8-B432-45BB-8756-AFC6123404B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-it\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98461CD-D04C-4C72-9F44-EEF0A5C60D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drff-itg\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C18651-C28F-459B-B055-A01EE6E81A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E124B14-05FE-48AB-9364-48EC03276569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D244DE-3A8D-40AF-8151-21886264F62D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-hf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F154DE4-6D89-46ED-A32D-FB6DA29908B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"165E5734-ED3F-4EF8-9737-BF0BA8FD45D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drg-htf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E9B93D2-0F82-410E-8936-CCEDD25E7B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F60960-266E-487C-8F07-4498A6E3EA77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D477E3-C042-47EE-B43F-03FF4903E2C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"496EED07-44EA-4E2A-8846-74227DB432A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC056CAA-FE35-48DF-864E-3457E9ED6B4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9dri-ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29B97C2-5B79-4743-B5AF-77D674835E8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F84B46-E273-44A6-A89D-4E5E47BDAFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3621F0A-8C0A-4CB3-A1F3-A7416794D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA297408-C2FB-45B6-894E-0D491F2E541C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10283C29-ABEF-416A-A45D-BE7EFBB6891E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4B20A3D-E691-4870-953C-5F85CAB5B3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C88C46-1716-4E4C-8C2A-AC21697E31AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"363937AB-EBBD-466D-A9FA-CD70B083D806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-hf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50932978-66A9-4F67-92D1-35E7FA9B4653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DE585E-EEBE-4DB2-AF04-16038E8B2A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-3ln4f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683BBAE2-89D5-4241-A981-8D7A9D8ECB9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-3tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7437EDE5-2D70-4A46-B749-2CF13FD1B86B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-7tpf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697C2608-7FD5-4A5B-8E09-1A68DDEBA73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drw-itpf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5D8E27-2613-4004-ACE4-B7F8643F7095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9drx\\\\+-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F94922A-A450-4D24-83BB-C3A55CC803D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"096BE775-0410-4143-AA3C-DE2F70753802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qr7-tf\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47A44372-6B5E-4DB5-AD22-97B80475048B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B5AF2A-069C-4D87-89E5-11A4CE544F27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84CF273B-3845-48D3-824E-6898ABD4FC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9qri-f\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAEE806-A1B6-40C8-BBA6-61AB180E3276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D19365C-7125-4EA9-A8EF-02A02ACF85A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA2CE72-088B-4CA6-894D-427CC4F2B6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2682D17-6376-4724-B434-0989FC2221A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scl\\\\+-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E984C99-B5D5-489D-8E90-5472210686BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C21D472-2364-4809-89B7-651CA25123BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5FCB9C0-8665-4850-A01C-0D1C47F34DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002C6967-4CCC-43B9-A687-B9B21533098E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138F57C5-269C-4963-80EA-F1F08AB4B6D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09BF315-D3D9-46C7-8FED-C24496FF57CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBDDAAF7-FA47-41E5-8722-08AAE9049C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26AE08D-9A49-4E92-A1A9-81502BE94B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A87A49-9B28-49EF-ABC3-2A69FB39C0D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3047CD31-5589-4030-B31A-3E4EDF251986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC06352-2CB3-472C-BE76-A6995415EF47\"}]}]}],\"references\":[{\"url\":\"http://www.kb.cert.org/vuls/id/648646\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/62098\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013\",\"source\":\"cret@cert.org\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/648646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/62098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
}
}
GHSA-479J-FQ45-9438
Vulnerability from github – Published: 2022-05-17 00:24 – Updated: 2022-05-17 00:24The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.
{
"affected": [],
"aliases": [
"CVE-2013-3609"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-09-08T03:17:00Z",
"severity": "HIGH"
},
"details": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.",
"id": "GHSA-479j-fq45-9438",
"modified": "2022-05-17T00:24:32Z",
"published": "2022-05-17T00:24:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3609"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"type": "WEB",
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/62098"
},
{
"type": "WEB",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"type": "WEB",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2013-3609
Vulnerability from fkie_nvd - Published: 2013-09-08 03:17 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23F574AF-FC1C-453C-A8FB-C11F42ED8E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B966320-9479-48D4-9C08-0C5BC655588D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C252A3D-C2F1-4E15-8CEA-ED86C550EBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "502A47AC-064C-49FE-AC9C-50D0C1B62DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB18D39-D5F9-4F4E-8FA7-F0FF7F896564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797EFABC-8823-4B42-8FA1-A26CF406166B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978262CA-7C6A-4F3D-9480-A08230E30EB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F113C555-5E90-4458-9C30-79C3EBB8E917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8551A73-5B20-44D5-BC9C-11F18F40C055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEBE2CB-7349-4A9A-838F-7E4220BF74E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39DEF117-ED63-42DF-A4E6-0A019BE82968",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A873933-3F6C-4EC0-8AB2-8B0DFCB7424F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAA5397-D28D-4817-AC21-F0D0DEA95489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35AE93B7-C3D1-45A8-9D2C-9DB7101AAECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CCF563E-6A20-4F99-80FB-1BED5149E8C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB097280-76E6-4DBE-BD2F-DDE3C9DBD734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36ACA455-CB46-4B0E-9F5B-86508907323C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A159DCC-D2F7-4409-B842-027100794679",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A34630C1-5B6A-46BD-BD0A-A1DED08003E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38A5024C-F341-4DD6-ABCF-B9259937732C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C09A30A7-C88C-4365-8D24-BFAB1EEF53F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D060E9B-0967-49E1-958B-B4557BC2634A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6596C3C0-9DAC-43AF-9185-51E16096BAEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05C4617-F33D-40F0-8271-C4FE1578BAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF4ECC2-7EF8-4150-AB45-D30B88BE884C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61EB064B-5A03-4D54-BB55-15AA35B44668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70E3EFB3-9E87-4C5C-B84D-F9A9AAFFED45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8C8686-ABA2-466F-8309-D483F128CE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C82B90F8-3E33-47E5-8D65-92BF39E7091D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C681E3DA-6BBB-40C9-B37F-0D37A4EC5DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35FD83D9-1F28-454F-9221-9CF69F8730E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47EA3F5D-38B1-4D3F-BA3B-C03598124119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD772BE-13CE-48F7-A24F-28825060561E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C38C112C-52D0-4D29-8FF6-298AD01B981C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D46200-C176-49FE-AB45-CD1706355A56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95798443-906A-445B-8CB7-9FAE8223AAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82286D8E-632D-440A-BF94-94331B195222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24D640B1-0DED-4CF0-AD43-AFFEBE953157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736B9BD0-E764-4321-A1A5-C8875147F701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0490EB39-70EA-494C-855C-6698B65421FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F62BC3F2-FCDD-41F6-90F1-1F75273BF4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB343D9-AA39-4837-AE84-CF8EC50B758A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65D600FF-CA39-40C0-8535-E39971E5C34A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E690BCC-685E-4A3C-9F30-C0429B6591FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "672B902B-C4B1-4E10-AE16-34C562029D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BE8D56-4810-470E-B284-CCD1D92736F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45003169-49AF-4CA0-8E44-0137476D0352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F84B957-6385-4533-B8B0-B252B695721A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A977F207-190D-48ED-AC31-A9D500114F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F77C1AD-12C9-492B-82B9-A5469182FEEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B111BB68-F4D3-471D-8B99-EE4AED27974A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39C2D975-2AEF-4083-820D-356D846DDC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6499489-EFEA-4C8E-B5F5-56F92DF25F2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03A480E-8EE9-4040-B1C6-3E60EBD010BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB68F879-2E55-4D12-8259-13C37004FB33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3B0FFF-0C52-4199-B0FB-0A16DCA5D51B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5D8C2C-683C-4670-9878-B879AAABD54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F818CA-1CB3-48B2-BED0-99C09A6F8259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D30206F-EA8A-4EA8-87CB-D6A47F4B75CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4401E676-3E1D-431E-ABAF-89BC9CAC64D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F67D8D5E-439D-45E2-A0BB-40EB60DCC0D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C27D83-5E57-4B7B-B765-B41AAA004C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1E2A1-71CA-48F0-8A91-E0AD896D4106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77777CE0-0095-4318-A194-D14CF4D699CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC43CCB5-7842-4BD3-B2DB-597815E129CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767854D0-2DE0-4628-B6D7-18161F471718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EF8A1A-3BBC-44DB-8469-14B71495E8AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4102B60-86D2-42AC-86A9-0F690CDA0970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*",
"matchCriteriaId": "097802C6-25DA-4D55-84E7-10B4E5CC59F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56C269C6-B569-493E-8D29-CE16C03CCA4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA6459A-758D-46D4-89F4-E4DE71FF48E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A91DEEFA-BFD4-4EBD-828A-02BBE4CA3F33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0853B35-F437-41D3-8126-0C51A788CDCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08F263B5-4723-4153-A751-78F539A3C64A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B9DE20-58F4-4EED-950F-FF8E07313D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE8879B-78B1-4372-BD32-C09B6EE083DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F26B68A6-66A9-4272-B6AE-ADCF0DE1733E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A99DE11-2E42-4C5C-9CD2-1B035EC8F0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C56CCB73-97FB-4F81-8D9E-2F441364AD22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D77595EF-70F4-41DD-85CF-D866AA4B3988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6BEBA8-B432-45BB-8756-AFC6123404B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E98461CD-D04C-4C72-9F44-EEF0A5C60D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C18651-C28F-459B-B055-A01EE6E81A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E124B14-05FE-48AB-9364-48EC03276569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19D244DE-3A8D-40AF-8151-21886264F62D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F154DE4-6D89-46ED-A32D-FB6DA29908B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "165E5734-ED3F-4EF8-9737-BF0BA8FD45D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DA5EBA4-E2E4-47D5-9B74-DC38BF7982E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9B93D2-0F82-410E-8936-CCEDD25E7B47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58F60960-266E-487C-8F07-4498A6E3EA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09D477E3-C042-47EE-B43F-03FF4903E2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "496EED07-44EA-4E2A-8846-74227DB432A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC056CAA-FE35-48DF-864E-3457E9ED6B4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D29B97C2-5B79-4743-B5AF-77D674835E8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86F84B46-E273-44A6-A89D-4E5E47BDAFAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3621F0A-8C0A-4CB3-A1F3-A7416794D185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA297408-C2FB-45B6-894E-0D491F2E541C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10283C29-ABEF-416A-A45D-BE7EFBB6891E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B20A3D-E691-4870-953C-5F85CAB5B3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40C88C46-1716-4E4C-8C2A-AC21697E31AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "363937AB-EBBD-466D-A9FA-CD70B083D806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D160E0-CB6D-4EAB-87F8-DD5A54AEE993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50932978-66A9-4F67-92D1-35E7FA9B4653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08DE585E-EEBE-4DB2-AF04-16038E8B2A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "683BBAE2-89D5-4241-A981-8D7A9D8ECB9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7437EDE5-2D70-4A46-B749-2CF13FD1B86B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697C2608-7FD5-4A5B-8E09-1A68DDEBA73E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D5D8E27-2613-4004-ACE4-B7F8643F7095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F94922A-A450-4D24-83BB-C3A55CC803D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "096BE775-0410-4143-AA3C-DE2F70753802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A44372-6B5E-4DB5-AD22-97B80475048B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91B5AF2A-069C-4D87-89E5-11A4CE544F27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84CF273B-3845-48D3-824E-6898ABD4FC53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAEE806-A1B6-40C8-BBA6-61AB180E3276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDF1AE-04B9-402A-AFD5-64FFAECCE5D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3E956A-57C6-46F4-A9EA-CC5F848BB9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D19365C-7125-4EA9-A8EF-02A02ACF85A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA2CE72-088B-4CA6-894D-427CC4F2B6E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2682D17-6376-4724-B434-0989FC2221A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C1C92F-AC9D-44A2-BD07-6ED22EF5C00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E984C99-B5D5-489D-8E90-5472210686BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C21D472-2364-4809-89B7-651CA25123BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5FCB9C0-8665-4850-A01C-0D1C47F34DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*",
"matchCriteriaId": "002C6967-4CCC-43B9-A687-B9B21533098E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAD56B7-8887-4AA8-9DB4-9DD1F5974DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "138F57C5-269C-4963-80EA-F1F08AB4B6D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B09BF315-D3D9-46C7-8FED-C24496FF57CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35D289D8-FF90-4CDD-ADF5-EB5C70AC0CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBDDAAF7-FA47-41E5-8722-08AAE9049C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26AE08D-9A49-4E92-A1A9-81502BE94B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08A87A49-9B28-49EF-ABC3-2A69FB39C0D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3047CD31-5589-4030-B31A-3E4EDF251986",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC06352-2CB3-472C-BE76-A6995415EF47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function."
},
{
"lang": "es",
"value": "La interfaz web en la implementaci\u00f3n Intelligent Platform Management Interface (IPMI) en dispositivos Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F y X9SR* confie en el c\u00f3digo JavaScript en el cliente para comprobaciones de autorizaci\u00f3n, lo que permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso a trav\u00e9s de una solicitud manipulada, relacionado con la funci\u00f3n PrivilegeCallBack."
}
],
"id": "CVE-2013-3609",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-09-08T03:17:39.603",
"references": [
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"source": "cret@cert.org",
"url": "http://www.securityfocus.com/bid/62098"
},
{
"source": "cret@cert.org",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"source": "cret@cert.org",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"source": "cret@cert.org",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"source": "cret@cert.org",
"tags": [
"Exploit"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/62098"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2016-AVI-303
Vulnerability from certfr_avis - Published: 2016-09-09 - Updated: 2016-09-09
De multiples vulnérabilités ont été corrigées dans les produits Citrix. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | XenServer | Citrix XenServer version 6.0 sans le correctif de sécurité XS60E063 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.39 pour solutions matérielles embarquées NetScaler MPX/SDX de type 11500/13500/14500/16500/18500/20500, 115xx, 17550/19550/20550/21550 et T1110, ainsi que CloudBridge CB4000 et CB5000 | ||
| Citrix | XenServer | Citrix XenServer version 6.2 SP1 sans le correctif de sécurité XS62ESP1048 | ||
| Citrix | XenServer | Citrix XenServer version 6.1 sans le correctif de sécurité XS61E073 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 4.08 pour solutions matérielles embarquées NetScaler MPX/SDX de type 14xxx, 25xxx, T1120 et T1300 | ||
| Citrix | XenServer | Citrix XenServer version 6.0.2 Common Criteria sans le correctif de sécurité XS602ECC034 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.21 pour solutions matérielles embarquées NetScaler MPX/SDX de type 8xxx et T1010, ainsi que CloudBridge CB2000 et CB3000 | ||
| Citrix | XenServer | Citrix XenServer version 6.0.2 sans le correctif de sécurité XS602E057 | ||
| Citrix | XenServer | Citrix XenServer version 6.5 SP1 sans le correctif de sécurité XS65ESP1038 | ||
| Citrix | XenServer | Citrix XenServer version 7.0 sans le correctif de sécurité XS70E012 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.24 pour solutions matérielles embarquées NetScaler de type 22xxx et T1200 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer version 6.0 sans le correctif de s\u00e9curit\u00e9 XS60E063",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.39 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 11500/13500/14500/16500/18500/20500, 115xx, 17550/19550/20550/21550 et T1110, ainsi que CloudBridge CB4000 et CB5000",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.2 SP1 sans le correctif de s\u00e9curit\u00e9 XS62ESP1048",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.1 sans le correctif de s\u00e9curit\u00e9 XS61E073",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 4.08 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 14xxx, 25xxx, T1120 et T1300",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.0.2 Common Criteria sans le correctif de s\u00e9curit\u00e9 XS602ECC034",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.21 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 8xxx et T1010, ainsi que CloudBridge CB2000 et CB3000",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.0.2 sans le correctif de s\u00e9curit\u00e9 XS602E057",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.5 SP1 sans le correctif de s\u00e9curit\u00e9 XS65ESP1038",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 7.0 sans le correctif de s\u00e9curit\u00e9 XS70E012",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.24 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler de type 22xxx et T1200",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2016-7094",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7094"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2013-4434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4434"
},
{
"name": "CVE-2014-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3570"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2016-7093",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7093"
},
{
"name": "CVE-2014-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3509"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2014-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2016-7154",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7154"
},
{
"name": "CVE-2013-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3619"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2013-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3622"
},
{
"name": "CVE-2014-3511",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3511"
},
{
"name": "CVE-2014-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3568"
},
{
"name": "CVE-2016-7092",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7092"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2013-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4421"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2013-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3608"
},
{
"name": "CVE-2014-8275",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8275"
},
{
"name": "CVE-2015-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0205"
},
{
"name": "CVE-2013-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3620"
},
{
"name": "CVE-2013-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3609"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2014-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3572"
},
{
"name": "CVE-2014-3508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3508"
},
{
"name": "CVE-2014-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3569"
},
{
"name": "CVE-2013-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3607"
},
{
"name": "CVE-2013-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3621"
},
{
"name": "CVE-2013-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3623"
}
],
"initial_release_date": "2016-09-09T00:00:00",
"last_revision_date": "2016-09-09T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-303",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-09-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Citrix\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX216071 du 08 septembre 2016",
"url": "http://support.citrix.com/article/CTX216071"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX216642 du 08 septembre 2016",
"url": "http://support.citrix.com/article/CTX216642"
}
]
}
VAR-201309-0165
Vulnerability from variot - Updated: 2025-04-11 22:53The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC, H8DG, H8SCM-F, H8SGL-F, H8SM, X7SP, X8DT, X8SI, X9DAX-, X9DB, X9DR, X9QR, X9SBAA-F, X9SC, X9SPU-F, and X9SR devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function. Supermicro Intelligent Platform Management Interface (IPMI) implementations based on ATEN firmware contain multiple vulnerabilities in their web management interface. Supermicro IPMI Web Interface is prone to a remote privilege-escalation vulnerability because it fails to adequately sanitize user-supplied input data. Remote attackers can exploit this issue to gain elevated privileges and perform unauthorized actions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201309-0165",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "x9sri-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sre-3f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sre-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9spu-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scm-iif",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srl-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srg-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srd-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9srw-f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sri-3f",
"scope": "eq",
"trust": 1.6,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hlibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgu-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7g\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9db3-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-h6ibff",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-ig\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-htf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgu-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sia-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-itf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spt-df-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtn\\+-f-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-ibff",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-7tf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgi-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sme-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qri-f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sca-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hlf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scl-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sit-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-itpf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dct-hln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qr7-tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-3ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8scm-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drl-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr3-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-7f-hft",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-h6f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-7ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9db3-tpf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sit-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8siu-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dct-ibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7tg\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-7",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-7f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sil-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6tf\\+-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr7-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbu-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr7-tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sgl-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-i\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgg-qf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6f\\+-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drl-ef",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-h6ibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dri-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sce-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtl-6f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-hf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sci-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-ef",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scd-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spa-hf-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-7ln4f-jbod",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dcl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-ln4f\\+-lr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dri-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr7-ln4f-jbod",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qr7-tf-jbod",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-itg\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scl\\+-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-6f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbi-tpf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbu-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7t\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbl-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drx\\+-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-7f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-hf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dg6-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spe-h-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spe-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sie-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-if-hft",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dax-itf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dre-ln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-7",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scm-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-7f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drfr",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drl-if",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spe-hf-d525",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drff-it\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qr7-tf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-3tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dcl-6f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drg-htf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drw-7tpf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8sie-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dre-tf\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dbi-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9scff-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9sbaa-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtn\\+-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtl-3f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9qri-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drd-7jln4f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dct-hibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spa-hf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x7spt-df-d525\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8sml-i",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dgt-hibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8dtu-ln4f\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9dr3-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x8si6-f",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drh-7tf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": "x9drt-ibqf",
"scope": "eq",
"trust": 1.0,
"vendor": "supermicro",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "supermicro",
"version": null
},
{
"model": "h8dcl-6f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dcl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dct-hibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dct-hln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dct-ibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dg6-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgg-qf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgi-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hlf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgt-hlibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgu-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8dgu-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8scm-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sgl-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sme-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-7",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-7f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-i",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "h8sml-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spa-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spa-hf-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spe-h-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spe-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spe-hf-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spt-df-d525",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x7spt-df-d525+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtl-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtl-6f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtn+-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtn+-f-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6f+-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-6tf+-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8dtu-ln4f+-lr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8si6-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sia-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sie-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sie-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sil-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sit-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8sit-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x8siu-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-7f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-7f-hft",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-7tf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-if-hft",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dax-itf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9db3-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9db3-tpf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbi-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbi-tpf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbl-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbu-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dbu-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr3-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr3-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr7-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr7-ln4f-jbod",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dr7-tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-7jln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-7ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-7ln4f-jbod",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-ef",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drd-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dre-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dre-tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7g+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7t+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-7tg+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-i+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-ig+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-it+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drff-itg+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drfr",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-hf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-hf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-htf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drg-htf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-7f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-7tf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drh-itf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dri-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9dri-ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drl-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drl-ef",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drl-if",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-h6f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-h6ibff",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-h6ibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-hf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-ibff",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drt-ibqf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-3ln4f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-3tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-7tpf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drw-itpf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9drx+-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qr7-tf",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qr7-tf+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qr7-tf-jbod",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qri-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9qri-f+",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sbaa-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sca-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scd-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sce-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scff-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sci-ln4f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scl+-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scl-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scm-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9scm-iif",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9spu-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srd-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sre-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sre-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srg-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sri-3f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9sri-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srl-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "x9srw-f",
"scope": null,
"trust": 0.8,
"vendor": "super micro computer",
"version": null
},
{
"model": "micro computer supermicro x9srl-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sri-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sri-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9srg-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sre-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sre-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9srd-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9spu-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scm-iif",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scm-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scl-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scl+-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sci-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scff-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sce-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9scd-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sca-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9sbaa-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qri-f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qri-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qr7-tf-jbod",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qr7-tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9qr7-tf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drx+-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-itpf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-7tpf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-3tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drw-3ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-ibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-ibff",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-hf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-h6ibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-h6ibff",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-h6f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drt-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drl-ef",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drl-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dri-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dri-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-itf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-7tf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drh-7f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-htf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-htf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-hf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drg-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drfr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-itg+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-it+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-ig+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-i+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7tg+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7t+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7g+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff-7",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drff",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dre-tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dre-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-ef",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-7ln4f-jbod",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-7ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9drd-7jln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr7-tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr7-ln4f-jbod",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr7-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr3-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dr3-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbu-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbu-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbl-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbi-tpf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dbi-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9db3-tpf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9db3-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-itf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-if-hft",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-7tf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-7f-hft",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x9dax-7f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8siu-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sit-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sit-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sil-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sie-ln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sie-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8sia-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8si6-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-ln4f+-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6tf+-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6tf+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6f+-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtu-6f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtn+-f-lr",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtn+-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtl-6f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x8dtl-3f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spt-df-d525+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spt-df-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spe-hf-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spe-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spe-h-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spa-hf-d525",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro x7spa-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-i",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-7f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sml-7",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sme-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8sgl-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8scm-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgu-ln4f+",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgu-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hlibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hlf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgt-hf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgi-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dgg-qf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dg6-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-ibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-hln4f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-hibqf",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dct-f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dcl-if",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "micro computer supermicro h8dcl-6f",
"scope": null,
"trust": 0.3,
"vendor": "super",
"version": null
},
{
"model": "netscaler t1",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "netscaler service delivery appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "netscaler gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "netscaler application delivery controller",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "command center appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
},
{
"model": "cloudbridge",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "0"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "BID",
"id": "62098"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:supermicro:h8dcl-6f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dcl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dct-hibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dct-hln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dct-ibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dg6-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgg-qf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgi-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hlf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgt-hlibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgu-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8dgu-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8scm-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sgl-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sme-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-7f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-i",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:h8sml-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spa-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spa-hf-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spe-h-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spe-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spe-hf-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x7spt-df-d525%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtl-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtl-6f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtn%2b-f-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6f%2b-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-6tf%2b-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8dtu-ln4f%2b-lr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8si6-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sia-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sie-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sie-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sil-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sit-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8sit-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x8siu-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-7f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-7f-hft",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-7tf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-if-hft",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dax-itf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9db3-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9db3-tpf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbi-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbi-tpf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbl-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbu-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dbu-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr3-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr3-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr7-ln4f-jbod",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dr7-tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-7jln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-7ln4f-jbod",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-ef",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drd-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dre-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dre-tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7g%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7t%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-7tg%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-i%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-ig%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-it%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drff-itg%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drfr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-hf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-hf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-htf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drg-htf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-7f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-7tf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drh-itf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dri-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9dri-ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drl-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drl-ef",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drl-if",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-h6f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibff",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-h6ibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-hf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-ibff",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drt-ibqf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-3ln4f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-3tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-7tpf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drw-itpf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9drx%2b-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qr7-tf",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qr7-tf%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qr7-tf-jbod",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qri-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9qri-f%2b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sbaa-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sca-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scd-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sce-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scff-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sci-ln4f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scl%2b-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scl-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scm-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9scm-iif",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9spu-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srd-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sre-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sre-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srg-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sri-3f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9sri-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srl-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:supermicro:x9srw-f",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "J. Alex Halderman",
"sources": [
{
"db": "BID",
"id": "62098"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
}
],
"trust": 0.9
},
"cve": "CVE-2013-3609",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-3609",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-3609",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2013-3609",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201308-544",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULMON",
"id": "CVE-2013-3609",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function. Supermicro Intelligent Platform Management Interface (IPMI) implementations based on ATEN firmware contain multiple vulnerabilities in their web management interface. Supermicro IPMI Web Interface is prone to a remote privilege-escalation vulnerability because it fails to adequately sanitize user-supplied input data. \nRemote attackers can exploit this issue to gain elevated privileges and perform unauthorized actions",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3609"
},
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "BID",
"id": "62098"
},
{
"db": "VULMON",
"id": "CVE-2013-3609"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#648646",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2013-3609",
"trust": 2.8
},
{
"db": "BID",
"id": "62098",
"trust": 2.0
},
{
"db": "JVN",
"id": "JVNVU96655201",
"trust": 0.8
},
{
"db": "USCERT",
"id": "TA13-207A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2013-3609",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"db": "BID",
"id": "62098"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"id": "VAR-201309-0165",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.225
},
"last_update_date": "2025-04-11T22:53:15.823000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.supermicro.com.tw/index_home.cfm"
},
{
"title": "Firmware Fixes to Common Vulnerabilities and Exposures",
"trust": 0.8,
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.9,
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"trust": 2.5,
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"trust": 1.9,
"url": "http://www.supermicro.com/products/nfo/files/ipmi/cve_update.pdf"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/62098"
},
{
"trust": 1.6,
"url": "http://www.supermicro.com/support/faqs/faq.cfm?faq=16536"
},
{
"trust": 1.4,
"url": "https://support.citrix.com/article/ctx216642"
},
{
"trust": 1.1,
"url": "http://www.thomas-krenn.com/en/wiki/supermicro_ipmi_security_updates_november_2013"
},
{
"trust": 0.8,
"url": "http://www.supermicro.com/"
},
{
"trust": 0.8,
"url": "https://www.usenix.org/conference/woot13/illuminating-security-issues-surrounding-lights-out-server-management"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3609"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu96655201/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3609"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/ncas/alerts/ta13-207a"
},
{
"trust": 0.3,
"url": "http://www.supermicro.com/about/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"db": "BID",
"id": "62098"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#648646"
},
{
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"db": "BID",
"id": "62098"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-30T00:00:00",
"db": "CERT/CC",
"id": "VU#648646"
},
{
"date": "2013-09-08T00:00:00",
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"date": "2013-08-30T00:00:00",
"db": "BID",
"id": "62098"
},
{
"date": "2013-09-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"date": "2013-08-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"date": "2013-09-08T03:17:39.603000",
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-07-29T00:00:00",
"db": "CERT/CC",
"id": "VU#648646"
},
{
"date": "2017-11-15T00:00:00",
"db": "VULMON",
"id": "CVE-2013-3609"
},
{
"date": "2016-09-09T15:00:00",
"db": "BID",
"id": "62098"
},
{
"date": "2013-12-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003994"
},
{
"date": "2013-09-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-544"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-3609"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Supermicro IPMI based on ATEN firmware contain multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#648646"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-544"
}
],
"trust": 0.6
}
}
GSD-2013-3609
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-3609",
"description": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.",
"id": "GSD-2013-3609"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-3609"
],
"details": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.",
"id": "GSD-2013-3609",
"modified": "2023-12-13T01:22:22.324306Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3609",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62098",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62098"
},
{
"name": "VU#648646",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf",
"refsource": "CONFIRM",
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf",
"refsource": "MISC",
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013",
"refsource": "MISC",
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX216642"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3609"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf"
},
{
"name": "VU#648646",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/648646"
},
{
"name": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf"
},
{
"name": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013",
"refsource": "MISC",
"tags": [],
"url": "http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013"
},
{
"name": "62098",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/62098"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.citrix.com/article/CTX216642"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-11-15T02:29Z",
"publishedDate": "2013-09-08T03:17Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.