mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
836102a684
commit
c65f9c8aa9
@ -1,18 +1,165 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "psirt@bosch.com",
|
||||
"DATE_PUBLIC": "2020-01-29T13:00:00.000Z",
|
||||
"ID": "CVE-2020-6768",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Path Traversal in Bosch Video Management System (BVMS)"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "DIVAR IP 3000",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"configuration": "vulnerable BVMS version installed",
|
||||
"version_affected": "=",
|
||||
"version_value": "All"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "DIVAR IP 7000",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"configuration": "vulnerable BVMS version installed",
|
||||
"version_affected": "=",
|
||||
"version_value": "All"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "DIVAR IP all-in-one 5000",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"configuration": "vulnerable BVMS version installed",
|
||||
"version_affected": "=",
|
||||
"version_value": "All"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Bosch Video Management System",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "7.5"
|
||||
},
|
||||
{
|
||||
"configuration": "patch for security issue 211404, 241463 not installed",
|
||||
"version_affected": "<=",
|
||||
"version_value": "8.0.0.329"
|
||||
},
|
||||
{
|
||||
"configuration": "patch for security issue 211404, 241463 not installed",
|
||||
"version_affected": "<=",
|
||||
"version_value": "9.0.0.827"
|
||||
},
|
||||
{
|
||||
"configuration": "patch for security issue 211404, 241463 not installed",
|
||||
"version_affected": "<=",
|
||||
"version_value": "10.0.0.1225"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "BVMS Viewer",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "7.5"
|
||||
},
|
||||
{
|
||||
"configuration": "patch for security issue 211404, 241463 not installed",
|
||||
"version_affected": "<=",
|
||||
"version_value": "8.0.0.329"
|
||||
},
|
||||
{
|
||||
"configuration": "patch for security issue 211404, 241463 not installed",
|
||||
"version_affected": "<=",
|
||||
"version_value": "9.0.0.827"
|
||||
},
|
||||
{
|
||||
"configuration": "patch for security issue 211404, 241463 not installed",
|
||||
"version_affected": "<=",
|
||||
"version_value": "10.0.0.1225"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Bosch"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment allows an unauthenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed."
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.0.9"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://psirt.bosch.com/security-advisories/bosch-sa-815013-bt.html",
|
||||
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-815013-bt.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "BOSCH-SA-815013-BT",
|
||||
"discovery": "INTERNAL"
|
||||
}
|
||||
}
|
18
2020/8xxx/CVE-2020-8797.json
Normal file
18
2020/8xxx/CVE-2020-8797.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-8797",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user