{"vulnerability": "CVE-2020-1191", "sightings": [{"uuid": "e78fbbaf-bd04-42ea-ae80-e32cec66c661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11916", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442904293792798", "content": "", "creation_timestamp": "2024-11-07T17:42:47.871241Z"}, {"uuid": "b51abaf8-a974-4f81-8737-e378f6bdea24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11919", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442904336676729", "content": "", "creation_timestamp": "2024-11-07T17:42:47.974411Z"}, {"uuid": "af66a569-f221-45c0-89fa-37571e0926b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11918", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442904322949184", "content": "", "creation_timestamp": "2024-11-07T17:42:48.050595Z"}, {"uuid": "0a9cd34b-9e94-4a30-8ae2-0899789e6f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11917", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442904308929203", "content": "", "creation_timestamp": "2024-11-07T17:42:48.163139Z"}, {"uuid": "b1333b2e-e091-4bc6-8879-3ccabf0a3a46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11916", "type": "seen", "source": "https://t.me/cvedetector/10118", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-11916 - Siime Eye Root Password Hashing Weakness\", \n  \"Content\": \"CVE ID : CVE-2020-11916 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. The password for the root user is hashed using an old and deprecated hashing technique. Because of this deprecated hashing, the success probability of an attacker in an offline cracking attack is greatly increased. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:06.000000Z"}, {"uuid": "e7839c63-bfdc-47ef-8f71-709cd15dd8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11915", "type": "seen", "source": "https://t.me/cibsecurity/23202", "content": "\u203c CVE-2020-11915 \u203c\n\nAn issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&amp;save=1&amp;reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-08T07:38:55.000000Z"}, {"uuid": "39704cab-2eb2-49fb-8e10-71cc4a5acdae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11919", "type": "seen", "source": "https://t.me/cvedetector/10122", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-11919 - Siime Eye CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2020-11919 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. There is no CSRF protection. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:12.000000Z"}, {"uuid": "806ff3ce-2aaf-4593-8efc-f0b1517738f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11918", "type": "seen", "source": "https://t.me/cvedetector/10121", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-11918 - Siime Eye Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2020-11918 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. When a backup file is created through the web interface, information on all users, including passwords, can be found in cleartext in the backup file. An attacker capable of accessing the web interface can create the backup file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:11.000000Z"}, {"uuid": "8a85faf5-b0f8-4deb-83d8-b8f39d521660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11917", "type": "seen", "source": "https://t.me/cvedetector/10120", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-11917 - \"Siime Eye Default SSID Reveals User Locations\"\", \n  \"Content\": \"CVE ID : CVE-2020-11917 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. It uses a default SSID value, which makes it easier for remote attackers to discover the physical locations of many Siime Eye devices, violating the privacy of users who do not wish to disclose their ownership of this type of device. (Various resources such as wigle.net can be use for mapping of SSIDs to physical locations.) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:07.000000Z"}]}