Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
*cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
*cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
*cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
*cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:* versions from (including) 4.0 up to (including) 4.0e
*cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
*cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:* versions from (including) 4.0 up to (including) 4.0e
*cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*
|
Changed |
CPE Configuration |
AND
OR
*cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*
OR
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
|
AND
OR
*cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*
OR
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
|
Removed |
CVSS V3 |
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
NIST NVD-CWE-noinfo
|
Removed |
CWE |
NIST CWE-20
|
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html No Types Assigned
|
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html No Types Assigned
|
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/96707 No Types Assigned
|
http://www.securityfocus.com/bid/96707 Broken Link, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.securitytracker.com/id/1037991 No Types Assigned
|
http://www.securitytracker.com/id/1037991 Broken Link, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf No Types Assigned
|
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf Third Party Advisory
|
Changed |
Reference Type |
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf No Types Assigned
|
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf Third Party Advisory
|
Changed |
Reference Type |
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 No Types Assigned
|
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 Third Party Advisory, US Government Resource
|
Changed |
Reference Type |
https://www.exploit-db.com/exploits/41891/ No Types Assigned
|
https://www.exploit-db.com/exploits/41891/ Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://www.exploit-db.com/exploits/41987/ No Types Assigned
|
https://www.exploit-db.com/exploits/41987/ Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://www.exploit-db.com/exploits/43970/ No Types Assigned
|
https://www.exploit-db.com/exploits/43970/ Exploit, Third Party Advisory, VDB Entry
|