{"id": "CVE-2023-6919", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "iletisim@usom.gov.tr", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2024-01-26T08:15:42.203", "references": [{"url": "https://www.usom.gov.tr/bildirim/tr-24-0054", "tags": ["Third Party Advisory"], "source": "iletisim@usom.gov.tr"}, {"url": "https://www.usom.gov.tr/bildirim/tr-24-0054", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "iletisim@usom.gov.tr", "description": [{"lang": "en", "value": "CWE-25"}]}], "descriptions": [{"lang": "en", "value": "Path Traversal: '/../filedir' vulnerability in Biges Safe Life Technologies Electronics Inc. VGuard allows Absolute Path Traversal.This issue affects VGuard: before V500.0003.R008.4011.C0012.B351.C.\n\n"}, {"lang": "es", "value": "Vulnerabilidad de Path Traversal: '/../filedir' en Biges Safe Life Technologies Electronics Inc. VGuard permite Absolute Path Traversal. Este problema afecta a VGuard: antes de V500.0003.R008.4011.C0012.B351.C."}], "lastModified": "2024-11-21T08:44:50.243", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-4c1a-lru_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9EB930A-8960-4F13-9FA1-AF3A8ED5F284", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-4c1a-lru:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "027FBB09-AB4B-4961-AF21-FE8F05B59FB4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-4c1a-lrpu_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17756524-D6A2-44A5-A939-FBFFA0CA19E1", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-4c1a-lrpu:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "703496E4-753F-4DD3-9134-DE952B284049"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-255a-bf_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49477B1C-4B2D-4291-B173-7A0835A27198", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-255a-bf:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F099A1C9-4EA9-49A0-8479-CE03A10D92C4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-255-bv_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D440B47-C2F2-405E-B46E-D47BB76D264A", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-255-bv:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "026C9CBB-76DD-42C4-8112-6D90D601897E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-255-df_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA6C4B94-167C-4FCF-8152-D9BF26A8F41C", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-255-df:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71111E6B-B8CA-486E-8E19-1ACE9CC57C1B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-64c8rd-nvr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B6F0020-D212-43C9-96D5-5BD36C5C89D1", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-64c8rd-nvr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "888954F6-1182-42C4-BB02-E195FE73C7CD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-4c1e-nvr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0FA9FA9-78CA-4B7A-B9B9-15A3AFD08B4D", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-4c1e-nvr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F755B81D-C702-46CE-9AB5-697686E4E7CA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-8c1e-nvr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24D79F3F-52BF-4107-9B0F-F4DCD6B35E07", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-8c1e-nvr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5BEF4458-2DCF-4064-BAD7-F80573DDC22F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:biges:vg-8c1a-lrpu_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BF11C5A-1130-42C9-BAB8-5F481CE6E061", "versionEndExcluding": "500.0003.r008.4011.c0012.b351.c"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:biges:vg-8c1a-lrpu:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F9637FC-968F-463A-9FB4-864D1FDB056E"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "iletisim@usom.gov.tr"}