{"containers":{"cna":{"affected":[{"product":"Smart Visu Server","vendor":"JUNG","versions":[{"status":"affected","version":"1.0.804"},{"status":"affected","version":"1.0.830"},{"status":"affected","version":"1.0.832"}]}],"credits":[{"lang":"en","value":"T. Weber"}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. This issue affects some unknown processing. The manipulation leads to backdoor. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-912","description":"CWE-912 Backdoor","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-22T06:10:14.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Feb/18"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.96815"}],"title":"JUNG Smart Visu Server backdoor","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20082","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"JUNG Smart Visu Server backdoor"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Smart Visu Server","version":{"version_data":[{"version_value":"1.0.804"},{"version_value":"1.0.830"},{"version_value":"1.0.832"}]}}]},"vendor_name":"JUNG"}]}},"credit":"T. Weber","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. This issue affects some unknown processing. The manipulation leads to backdoor. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"5.5","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-912 Backdoor"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Feb/18","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Feb/18"},{"name":"https://vuldb.com/?id.96815","refsource":"MISC","url":"https://vuldb.com/?id.96815"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.349Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Feb/18"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.96815"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:09:09.795706Z","id":"CVE-2017-20082","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:15:53.980Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20082","datePublished":"2022-06-22T06:10:15.000Z","dateReserved":"2022-06-19T00:00:00.000Z","dateUpdated":"2025-04-15T14:15:53.980Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}