mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
130 lines
5.0 KiB
JSON
130 lines
5.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-0418",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability has been found in iSharer and upRedSun File Sharing Wizard up to 1.5.0 and classified as problematic. This vulnerability affects unknown code of the component GET Request Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250438 is the identifier assigned to this vulnerability."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "In iSharer and upRedSun File Sharing Wizard bis 1.5.0 wurde eine problematische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Komponente GET Request Handler. Dank Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-404 Denial of Service",
|
|
"cweId": "CWE-404"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "iSharer and upRedSun",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "File Sharing Wizard",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "1.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.250438",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.250438"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.250438",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.250438"
|
|
},
|
|
{
|
|
"url": "https://www.youtube.com/watch?v=WK7xK9KHiMU",
|
|
"refsource": "MISC",
|
|
"name": "https://www.youtube.com/watch?v=WK7xK9KHiMU"
|
|
},
|
|
{
|
|
"url": "https://cxsecurity.com/issue/WLB-2024010023",
|
|
"refsource": "MISC",
|
|
"name": "https://cxsecurity.com/issue/WLB-2024010023"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "fernando.mengali (VulDB User)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 5.3,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 5.3,
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 5,
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
|
|
}
|
|
]
|
|
}
|
|
} |