var-202001-1487
Vulnerability from variot

Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated user, using a specially crafted URL command, to execute commands as root. Geutebruck IP Camera G-Code and G-Cam In OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. G-Cam is a web camera series launched by Geutebrück. G-Code is an analog video encoder launched by Geutebrück.

Geutebrück G-Cam and G-Code have OS command injection vulnerabilities. The vulnerability stems from the fact that external input data constructs executable commands for the operating system, and the network system or product does not properly filter special characters and commands. Attackers can use this vulnerability to execute illegal operating system commands. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user and inject and execute arbitrary commands. Other attacks are also possible. The following products of Geutebruck are affected: G-Code EEC-2xxx version 1.12.0.25 and prior G-Cam EBC-21xx version 1.12.0.25 and prior G-Cam EFD-22xx version 1.12.0.25 and prior G-Cam ETHC-22xx version 1.12.0.25 and prior G-Cam EWPC-22xx version 1.12.0.25 and prior

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1487",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "g-code eec-2400",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ebc-2110",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam efd-2241",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ethc-2249",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ethc-2239",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ebc-2111",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam efd-2250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ethc-2240",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ewpc-2270",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam efd-2240",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam ethc-2230",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "geutebrueck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ebc-2110",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ebc-2111",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/efd-2240",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/efd-2241",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/efd-2250",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ethc-2230",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ethc-2239",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ethc-2240",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ethc-2249",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-code/eec-2400",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "geutebruck",
        "version": "\u003c=1.12.0.25"
      },
      {
        "model": "g-code",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "geutebruck",
        "version": "\u003c=1.12.0.25"
      },
      {
        "model": "g-code/eec-2xxx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ewpc-22xx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ethc-22xx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/efd-22xx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-cam/ebc-21xx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.0.25"
      },
      {
        "model": "g-code/eec-2xxx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.13.2"
      },
      {
        "model": "g-cam/ewpc-22xx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.13.2"
      },
      {
        "model": "g-cam/ethc-22xx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.13.2"
      },
      {
        "model": "g-cam/efd-22xx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.13.2"
      },
      {
        "model": "g-cam/ebc-21xx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "geutebruck",
        "version": "1.12.13.2"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "BID",
        "id": "108579"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_ebc-2110_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_ebc-2111_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_efd-2240_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_efd-2241_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam%2fefd-2250_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_ethc-2230_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_ethc-2239_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_ethc-2240_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-cam_ethc-2249_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:geutebruck:g-code_eec-2400_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Romain Luyer and Guillaume Gronnier from CEIS, and Davy Douhine from RandoriSec reported these vulnerabilities to NCCIC., and Davy Douhine from RandoriSec, and Davy Douhine from RandoriSec.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-10956",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2019-10956",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2020-22346",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.2,
            "id": "CVE-2019-10956",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.2,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-10956",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-10956",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-10956",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-22346",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201906-088",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-10956",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-10956"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated user, using a specially crafted URL command, to execute commands as root. Geutebruck IP Camera G-Code and G-Cam In OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. G-Cam is a web camera series launched by Geutebr\u00fcck. G-Code is an analog video encoder launched by Geutebr\u00fcck. \n\r\n\r\nGeutebr\u00fcck G-Cam and G-Code have OS command injection vulnerabilities. The vulnerability stems from the fact that external input data constructs executable commands for the operating system, and the network system or product does not properly filter special characters and commands. Attackers can use this vulnerability to execute illegal operating system commands. \nSuccessful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user and inject and execute arbitrary commands. Other attacks are also possible. \nThe following products of Geutebruck are affected:\nG-Code EEC-2xxx version 1.12.0.25 and prior\nG-Cam EBC-21xx version 1.12.0.25 and prior\nG-Cam EFD-22xx version 1.12.0.25 and prior\nG-Cam ETHC-22xx version 1.12.0.25 and prior\nG-Cam EWPC-22xx version 1.12.0.25 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "BID",
        "id": "108579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-10956"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-19-155-03",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "108579",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-10956",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-10956"
      },
      {
        "db": "BID",
        "id": "108579"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "id": "VAR-202001-1487",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      }
    ],
    "trust": 1.5020833375
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:51:41.399000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.geutebrueck.com/"
      },
      {
        "title": "Patch for Geutebr\u00fcck G-Cam and G-Code OS command injection vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/213553"
      },
      {
        "title": "Multiple Geutebr\u00fcck Product Command Injection Vulnerability Fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93177"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-155-03"
      },
      {
        "trust": 1.6,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-155-03"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10956"
      },
      {
        "trust": 0.9,
        "url": "https://www.geutebrueck.com/en_en.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10956"
      },
      {
        "trust": 0.7,
        "url": "https://www.securityfocus.com/bid/108579"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/78.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-10956"
      },
      {
        "db": "BID",
        "id": "108579"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-10956"
      },
      {
        "db": "BID",
        "id": "108579"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-04-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "date": "2020-01-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-10956"
      },
      {
        "date": "2019-06-05T00:00:00",
        "db": "BID",
        "id": "108579"
      },
      {
        "date": "2020-02-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "date": "2019-06-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      },
      {
        "date": "2020-01-17T18:15:12.040000",
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-04-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-22346"
      },
      {
        "date": "2020-01-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-10956"
      },
      {
        "date": "2019-06-05T00:00:00",
        "db": "BID",
        "id": "108579"
      },
      {
        "date": "2020-02-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      },
      {
        "date": "2020-01-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      },
      {
        "date": "2024-11-21T04:20:13.833000",
        "db": "NVD",
        "id": "CVE-2019-10956"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Geutebruck IP Camera G-Code and  G-Cam In  OS Command injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-014194"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-088"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.