Show plain JSON{"containers": {"cna": {"affected": [{"product": "ServiSign Windows versions", "vendor": "CHANGING", "versions": [{"lessThanOrEqual": "1.0.19.0617", "status": "affected", "version": "0", "versionType": "custom"}]}], "datePublic": "2020-02-03T00:00:00", "descriptions": [{"lang": "en", "value": "A Remote Code Execution(RCE) vulnerability exists in some designated applications in ServiSign security plugin, as long as the interface is captured, attackers are able to launch RCE and executes arbitrary command on target system via malicious crafted scripts."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "Remote Code Execution", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2020-02-11T15:55:42", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201910005"}, {"tags": ["x_refsource_MISC"], "url": "https://www.chtsecurity.com/news/1179d48b-7609-4f67-9d7e-3bac2979c6ce"}], "source": {"discovery": "EXTERNAL"}, "title": "ServiSign Windows Versions- Remote Code Execution via LoadLibrary", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"AKA": "TWCERT/CC", "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2020-02-03T10:00:00.000Z", "ID": "CVE-2020-3925", "STATE": "PUBLIC", "TITLE": "ServiSign Windows Versions- Remote Code Execution via LoadLibrary"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "ServiSign Windows versions", "version": {"version_data": [{"version_affected": "<=", "version_name": "0", "version_value": "1.0.19.0617"}]}}]}, "vendor_name": "CHANGING"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A Remote Code Execution(RCE) vulnerability exists in some designated applications in ServiSign security plugin, as long as the interface is captured, attackers are able to launch RCE and executes arbitrary command on target system via malicious crafted scripts."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Remote Code Execution"}]}]}, "references": {"reference_data": [{"name": "https://tvn.twcert.org.tw/taiwanvn/TVN-201910005", "refsource": "MISC", "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201910005"}, {"name": "https://www.chtsecurity.com/news/1179d48b-7609-4f67-9d7e-3bac2979c6ce", "refsource": "MISC", "url": "https://www.chtsecurity.com/news/1179d48b-7609-4f67-9d7e-3bac2979c6ce"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T07:52:20.342Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201910005"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.chtsecurity.com/news/1179d48b-7609-4f67-9d7e-3bac2979c6ce"}]}]}, "cveMetadata": {"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2020-3925", "datePublished": "2020-02-03T11:00:30.831250Z", "dateReserved": "2019-12-20T00:00:00", "dateUpdated": "2024-09-17T03:22:58.327Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}