René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
3.2 KiB
JSON

{
"id": "CVE-2020-23741",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-03T19:15:12.467",
"lastModified": "2020-12-04T22:30:32.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In AnyView (network police) network monitoring software 4.6.0.1, there is a local denial of service vulnerability in AnyView, attackers can use a constructed program to cause a computer crash (BSOD)."
},
{
"lang": "es",
"value": "En AnyView (network police) network monitoring software versi\u00f3n 4.6.0.1, se presenta una vulnerabilidad local de denegaci\u00f3n de servicio en AnyView, atacantes pueden usar un programa construido para causar un bloqueo del ordenador (BSOD)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amoisoft:anyview:4.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CC8DA6AE-0772-4BF9-A523-8D4698C854DF"
}
]
}
]
}
],
"references": [
{
"url": "http://www.amoisoft.com/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/y5s5k5/CVE-2020-23741",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://github.com/y5s5k5/POCtemp9",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}
]
}