Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://srcincite.io/advisories/src-2020-0011/", "name": "https://srcincite.io/advisories/src-2020-0011/", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://srcincite.io/pocs/src-2020-0011.py.txt", "name": "https://srcincite.io/pocs/src-2020-0011.py.txt", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/", "name": "https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html", "name": "https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html", "name": "http://packetstormsecurity.com/files/156730/ManageEngine-Desktop-Central-Java-Deserialization.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "https://cwe.mitre.org/data/definitions/502.html", "name": "https://cwe.mitre.org/data/definitions/502.html", "tags": ["Third Party Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-502"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2020-10189", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "acInsufInfo": false, "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}}, "publishedDate": "2020-03-06T17:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "10.0.479"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-10-07T13:42Z"}