VAR-201708-0323
Vulnerability from variot - Updated: 2025-04-20 23:24Kguard Digital Video Recorder 104, 108, v2 does not have any authorization or authentication between an ActiveX client and the application server. Kguard Digital Video Recorder 104 and 108 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Kguard Digital Video Recorder (DVR) is a digital hard disk recorder from Kguard. There is a command injection vulnerability in Kguard Digital Video Recorder. An attacker could exploit this vulnerability to execute arbitrary commands in the context of an affected application. KguardDVR has security bypass, information disclosure, denial of service, and command injection vulnerabilities. An information-disclosure vulnerability 3. Multiple denial-of-service vulnerability 4
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-0323",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "digital video recorder",
"scope": null,
"trust": 2.4,
"vendor": "kguard",
"version": null
},
{
"model": "kg-sha104",
"scope": "eq",
"trust": 1.6,
"vendor": "kguardsecurity",
"version": "2.0"
},
{
"model": "kg-sha108",
"scope": "eq",
"trust": 1.6,
"vendor": "kguardsecurity",
"version": "2.0"
},
{
"model": "kg-sha104",
"scope": "eq",
"trust": 0.8,
"vendor": "kguard security",
"version": "2"
},
{
"model": "kg-sha108",
"scope": "eq",
"trust": 0.8,
"vendor": "kguard security",
"version": "2"
},
{
"model": "digital video recorder",
"scope": "eq",
"trust": 0.6,
"vendor": "kguard",
"version": "1042.0"
},
{
"model": "digital video recorder108",
"scope": "eq",
"trust": 0.6,
"vendor": "kguard",
"version": "2.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:kguardsecurity:kg-sha104_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:kguardsecurity:kg-sha108_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Federick Joe P Fajardo",
"sources": [
{
"db": "BID",
"id": "73032"
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
}
],
"trust": 0.9
},
"cve": "CVE-2015-4464",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-4464",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-04359",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-29428",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-04360",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2015-04368",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-04361",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-82425",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2015-4464",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-4464",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2015-4464",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2015-04359",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2017-29428",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2015-04360",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-04368",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-04361",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201507-141",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-82425",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "VULHUB",
"id": "VHN-82425"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kguard Digital Video Recorder 104, 108, v2 does not have any authorization or authentication between an ActiveX client and the application server. Kguard Digital Video Recorder 104 and 108 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Kguard Digital Video Recorder (DVR) is a digital hard disk recorder from Kguard. There is a command injection vulnerability in Kguard Digital Video Recorder. An attacker could exploit this vulnerability to execute arbitrary commands in the context of an affected application. KguardDVR has security bypass, information disclosure, denial of service, and command injection vulnerabilities. An information-disclosure vulnerability\n3. Multiple denial-of-service vulnerability\n4",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-4464"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "BID",
"id": "73032"
},
{
"db": "VULHUB",
"id": "VHN-82425"
}
],
"trust": 4.68
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-82425",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-82425"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "73032",
"trust": 5.0
},
{
"db": "NVD",
"id": "CVE-2015-4464",
"trust": 3.4
},
{
"db": "PACKETSTORM",
"id": "132437",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-04359",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2017-29428",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2015-04360",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2015-04368",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2015-04361",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-82425",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "VULHUB",
"id": "VHN-82425"
},
{
"db": "BID",
"id": "73032"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"id": "VAR-201708-0323",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "VULHUB",
"id": "VHN-82425"
}
],
"trust": 4.1
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 3.0
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
}
]
},
"last_update_date": "2025-04-20T23:24:55.476000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-82425"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.7,
"url": "http://www.securityfocus.com/bid/73032"
},
{
"trust": 2.5,
"url": "http://packetstormsecurity.com/files/132437/kguard-digital-video-recorder-bypass-issues.html"
},
{
"trust": 1.7,
"url": "https://www.academia.edu/11677554/kguard_digital_video_recorders_multiple_vulnerabilities"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/535822/100/0/threaded"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4464"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4464"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/535822/100/0/threaded"
},
{
"trust": 0.3,
"url": "http://seclists.org/bugtraq/2015/mar/34"
},
{
"trust": 0.3,
"url": "http://seclists.org/bugtraq/2015/jun/117"
},
{
"trust": 0.3,
"url": "http://us.kworld-global.com/main/prod_in.aspx?mnuid=1306\u0026modid=10\u0026prodid=527\u0026flag=1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "VULHUB",
"id": "VHN-82425"
},
{
"db": "BID",
"id": "73032"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"db": "VULHUB",
"id": "VHN-82425"
},
{
"db": "BID",
"id": "73032"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"date": "2017-10-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"date": "2017-08-18T00:00:00",
"db": "VULHUB",
"id": "VHN-82425"
},
{
"date": "2015-03-10T00:00:00",
"db": "BID",
"id": "73032"
},
{
"date": "2017-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"date": "2015-03-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"date": "2017-08-18T18:29:01",
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04359"
},
{
"date": "2017-10-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-29428"
},
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04360"
},
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04368"
},
{
"date": "2015-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-04361"
},
{
"date": "2018-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-82425"
},
{
"date": "2015-07-15T00:45:00",
"db": "BID",
"id": "73032"
},
{
"date": "2017-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007803"
},
{
"date": "2017-08-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201507-141"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-4464"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kguard Digital Video Recorder 104 and 108 Authentication vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007803"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201507-141"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.