mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 03:01:36 +00:00
36 lines
1.1 KiB
JSON
36 lines
1.1 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-38272",
|
||
|
"sourceIdentifier": "cve-coordination@google.com",
|
||
|
"published": "2024-06-26T16:15:11.733",
|
||
|
"lastModified": "2024-06-26T16:15:11.733",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "There exists a vulnerability in Quickshare/Nearby where an attacker can bypass the accept file dialog on QuickShare Windows.\u00a0Normally in QuickShare Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quickshare or above"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "cve-coordination@google.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-294"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://github.com/google/nearby/pull/2402",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/google/nearby/pull/2589",
|
||
|
"source": "cve-coordination@google.com"
|
||
|
}
|
||
|
]
|
||
|
}
|