cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-3634,https://securityvulnerability.io/vulnerability/CVE-2013-3634,,"A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions < V5.0.0 for CVE-2013-3633 and versions < V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.1.0). The implementation of SNMPv3 does not check the user credentials sufficiently. Therefore, an attacker is able to execute SNMP commands without correct credentials.",Siemens,"Scalance X200irt Firmware,Scalance X200-4p Irt,Scalance X201-3p Irt,Scalance X202-2irt,Scalance X202-2p Irt,Scalance X204irt,Scalance Xf204irt",,,0.0016599999507889152,false,,false,false,false,,false,false,2013-05-24T20:00:00.000Z,0 CVE-2013-3633,https://securityvulnerability.io/vulnerability/CVE-2013-3633,,"A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions < V5.0.0 for CVE-2013-3633 and versions < V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.1.0). The user privileges for the web interface are only enforced on client side and not properly verified on server side. Therefore, an attacker is able to execute privileged commands using an unprivileged account.",Siemens,"Scalance X200irt Firmware,Scalance X200-4p Irt,Scalance X201-3p Irt,Scalance X202-2irt,Scalance X202-2p Irt,Scalance X204irt,Scalance Xf204irt",,,0.000859999970998615,false,,false,false,false,,false,false,2013-05-24T20:00:00.000Z,0