cvelist/2024/30xxx/CVE-2024-30170.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2024-04-02 14:15:08 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2024-08-06 14:00:36 +00:00
"ID": "CVE-2024-30170",
"STATE": "PUBLIC"
2024-04-02 14:15:08 +00:00
},
2024-08-06 14:00:36 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2024-04-02 14:15:08 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2024-08-06 14:00:36 +00:00
"value": "PrivX before 34.0 allows data exfiltration and denial of service via the REST API. This is fixed in minor versions 33.1, 32.3, 31.3, and later, and in major version 34.0 and later,"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://privx.docs.ssh.com/docs/security",
"refsource": "MISC",
"name": "https://privx.docs.ssh.com/docs/security"
},
{
"refsource": "CONFIRM",
"name": "https://info.ssh.com/improper-input-validation-faq",
"url": "https://info.ssh.com/improper-input-validation-faq"
2024-04-02 14:15:08 +00:00
}
]
}
}