{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T02:07:48.229","vulnerabilities":[{"cve":{"id":"CVE-2020-12775","sourceIdentifier":"twcert@cert.org.tw","published":"2022-03-01T02:15:07.213","lastModified":"2024-11-21T05:00:16.097","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service."},{"lang":"es","value":"El componente del lado del cliente de Hicos citizen certificate no filtra los caracteres especiales para los parámetros de comandos en las URL web específicas. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para llevar a cabo un ataque de inyección de comandos para ejecutar un comando arbitrario del sistema, interrumpir el sistema o terminar el servicio."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:moica:hicos:*:*:*:*:*:macos:*:*","versionEndIncluding":"1.3.4.12","matchCriteriaId":"240899FB-807D-4FD5-8D6E-FC4933B45C00"},{"vulnerable":true,"criteria":"cpe:2.3:a:moica:hicos:*:*:*:*:*:windows:*:*","versionEndIncluding":"3.0.0","matchCriteriaId":"205FC370-D7F2-468D-B859-A3DA104CB13D"}]}]}],"references":[{"url":"https://moica.nat.gov.tw/rac_plugin.html","source":"twcert@cert.org.tw","tags":["Patch","Vendor Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://moica.nat.gov.tw/rac_plugin.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}