cvelist/2024/38xxx/CVE-2024-38642.json

91 lines
2.8 KiB
JSON
Raw Normal View History

2024-06-19 01:00:32 +00:00
{
2024-09-06 17:00:37 +00:00
"data_version": "4.0",
2024-06-19 01:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-38642",
2024-09-06 17:00:37 +00:00
"ASSIGNER": "security@qnap.com",
"STATE": "PUBLIC"
2024-06-19 01:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-09-06 17:00:37 +00:00
"value": "An improper certificate validation vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow local network users to compromise the security of the system via unspecified vectors.\n\nWe have already fixed the vulnerability in the following version:\nQuMagie 2.3.1 and later"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-295",
"cweId": "CWE-295"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "QNAP Systems Inc.",
"product": {
"product_data": [
{
"product_name": "QuMagie",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.3.x",
"version_value": "2.3.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-34",
"refsource": "MISC",
"name": "https://www.qnap.com/en/security-advisory/qsa-24-34"
2024-06-19 01:00:32 +00:00
}
]
2024-09-06 17:00:37 +00:00
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "QSA-24-34",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "We have already fixed the vulnerability in the following version:<br>QuMagie 2.3.1 and later<br>"
}
],
"value": "We have already fixed the vulnerability in the following version:\nQuMagie 2.3.1 and later"
}
],
"credits": [
{
"lang": "en",
"value": "anonymous"
}
]
2024-06-19 01:00:32 +00:00
}