mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
75 lines
2.2 KiB
JSON
75 lines
2.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-29978",
|
||
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||
|
"published": "2024-11-26T08:15:05.353",
|
||
|
"lastModified": "2024-11-26T08:15:05.353",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "vultures@jpcert.or.jp",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
|
"baseScore": 5.9,
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE"
|
||
|
},
|
||
|
"exploitabilityScore": 2.2,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "vultures@jpcert.or.jp",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-256"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
}
|
||
|
]
|
||
|
}
|