cvelist/2020/12xxx/CVE-2020-12106.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2020-04-23 17:01:15 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-08-12 19:02:35 +00:00
"ID": "CVE-2020-12106",
"STATE": "PUBLIC"
2020-04-23 17:01:15 +00:00
},
2020-08-12 19:02:35 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-04-23 17:01:15 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-08-12 19:02:35 +00:00
"value": "The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows unauthenticated users to send HTTP POST request to several critical Administrative functions such as, changing credentials of the Administrator account or connect the product to a rogue access point."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.stengg.com/cybersecurity",
"refsource": "MISC",
"name": "https://www.stengg.com/cybersecurity"
},
{
"refsource": "MISC",
"name": "https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf",
"url": "https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf"
2020-04-23 17:01:15 +00:00
}
]
}
}