{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T19:14:37.395","vulnerabilities":[{"cve":{"id":"CVE-2020-5622","sourceIdentifier":"vultures@jpcert.or.jp","published":"2020-09-02T05:15:12.347","lastModified":"2024-11-21T05:34:22.650","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Shadankun Server Security Type (excluding normal blocking method types) Ver.1.5.3 and earlier allows remote attackers to cause a denial of service which may result in not being able to add newly detected attack source IP addresses as blocking targets for about 10 minutes via a specially crafted request."},{"lang":"es","value":"Shadankun Server Security Type (excluyendo los tipos de métodos de bloqueo normales) versiones Ver.1.5.3 y anteriores, permite a atacantes remotos causar una denegación de servicio que puede resultar en no poder agregar direcciones IP de fuentes de ataque recién detectadas como objetivos de bloqueo por aproximadamente 10 minutos mediante una petición especialmente diseñada"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:shadan-kun:server_security_type:*:*:*:*:*:*:*:*","versionEndIncluding":"1.5.3","matchCriteriaId":"9331CEF8-A1DC-4351-91CD-687D32C4C55F"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN42665874/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.shadan-kun.com/news/20200831/","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN42665874/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.shadan-kun.com/news/20200831/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}