cvelist/2019/9xxx/CVE-2019-9483.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2019-03-01 00:06:05 -05:00
{
2019-03-18 00:40:03 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-03-01 00:06:05 -05:00
{
2019-03-18 00:40:03 +00:00
"lang": "eng",
"value": "Amazon Ring Doorbell before 3.4.7 mishandles encryption, which allows attackers to obtain audio and video data, or insert spoofed video that does not correspond to the actual person at the door."
2019-03-01 00:06:05 -05:00
}
2019-03-18 00:40:03 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts",
"refsource": "MISC",
"url": "https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts"
},
{
"name": "https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/",
"refsource": "MISC",
"url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"
}
]
}
}