cvelist/2024/47xxx/CVE-2024-47484.json

108 lines
4.1 KiB
JSON
Raw Normal View History

2024-09-25 06:00:41 +00:00
{
2024-12-10 11:00:53 +00:00
"data_version": "4.0",
2024-09-25 06:00:41 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-47484",
2024-12-10 11:00:53 +00:00
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
2024-09-25 06:00:41 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-12-16 11:00:52 +00:00
"value": "Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution."
2024-12-10 11:00:53 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Avamar",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "19.4"
},
{
"version_affected": "=",
"version_value": "19.7"
},
{
"version_affected": "=",
"version_value": "19.8"
},
{
"version_affected": "=",
"version_value": "19.9"
},
{
"version_affected": "=",
"version_value": "19.10"
},
{
"version_affected": "=",
"version_value": "19.10SP1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
2024-09-25 06:00:41 +00:00
}
]
}
}