cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-4652,https://securityvulnerability.io/vulnerability/CVE-2013-4652,,Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.,Siemens,"Scalance W700 Series Firmware,Scalance W744-1,Scalance W744-1pro,Scalance W746-1,Scalance W746-1pro,Scalance W747-1,Scalance W747-1rr,Scalance W784-1,Scalance W784-1rr,Scalance W786-1pro,Scalance W786-2pro,Scalance W786-2rr,Scalance W786-3pro,Scalance W788-1pro,Scalance W788-1rr,Scalance W788-2pro,Scalance W788-2rr",,,0.0051299999468028545,false,,false,false,false,,false,false,2013-08-01T13:32:00.000Z,0 CVE-2013-4651,https://securityvulnerability.io/vulnerability/CVE-2013-4651,,"Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.",Siemens,"Scalance W700 Series Firmware,Scalance W744-1,Scalance W744-1pro,Scalance W746-1,Scalance W746-1pro,Scalance W747-1,Scalance W747-1rr,Scalance W784-1,Scalance W784-1rr,Scalance W786-1pro,Scalance W786-2pro,Scalance W786-2rr,Scalance W786-3pro,Scalance W788-1pro,Scalance W788-1rr,Scalance W788-2pro,Scalance W788-2rr",,,0.0018100000452250242,false,,false,false,false,,false,false,2013-08-01T13:32:00.000Z,0