mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
59 lines
1.8 KiB
JSON
59 lines
1.8 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-45719",
|
||
|
"sourceIdentifier": "security@apache.org",
|
||
|
"published": "2024-11-22T15:15:10.473",
|
||
|
"lastModified": "2024-11-22T21:15:18.130",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Inadequate Encryption Strength vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.4.0.\n\nThe ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable.\nUsers are recommended to upgrade to version 1.4.1, which fixes the issue."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
|
||
|
"baseScore": 2.6,
|
||
|
"baseSeverity": "LOW",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE"
|
||
|
},
|
||
|
"exploitabilityScore": 1.0,
|
||
|
"impactScore": 1.4
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "security@apache.org",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-326"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://lists.apache.org/thread/sz2d0z39k01nbx3r9pj65t76o1hy9491",
|
||
|
"source": "security@apache.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.openwall.com/lists/oss-security/2024/11/22/1",
|
||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||
|
}
|
||
|
]
|
||
|
}
|