mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
77 lines
3.0 KiB
JSON
77 lines
3.0 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-48862",
|
||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||
|
"published": "2024-11-22T16:15:28.623",
|
||
|
"lastModified": "2024-11-22T16:15:28.623",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A link following vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers to traverse the file system to unintended locations and read or overwrite the contents of unexpected files.\n\nWe have already fixed the vulnerability in the following versions:\nQuLog Center 1.7.0.831 ( 2024/10/15 ) and later\nQuLog Center 1.8.0.888 ( 2024/10/15 ) and later"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV40": [
|
||
|
{
|
||
|
"source": "security@qnapsecurity.com.tw",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "4.0",
|
||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||
|
"baseScore": 8.7,
|
||
|
"baseSeverity": "HIGH",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"attackRequirements": "NONE",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "PASSIVE",
|
||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||
|
"vulnerableSystemIntegrity": "HIGH",
|
||
|
"vulnerableSystemAvailability": "HIGH",
|
||
|
"subsequentSystemConfidentiality": "NONE",
|
||
|
"subsequentSystemIntegrity": "NONE",
|
||
|
"subsequentSystemAvailability": "NONE",
|
||
|
"exploitMaturity": "NOT_DEFINED",
|
||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||
|
"integrityRequirements": "NOT_DEFINED",
|
||
|
"availabilityRequirements": "NOT_DEFINED",
|
||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||
|
"safety": "NOT_DEFINED",
|
||
|
"automatable": "NOT_DEFINED",
|
||
|
"recovery": "NOT_DEFINED",
|
||
|
"valueDensity": "NOT_DEFINED",
|
||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||
|
"providerUrgency": "NOT_DEFINED"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "security@qnapsecurity.com.tw",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-59"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-46",
|
||
|
"source": "security@qnapsecurity.com.tw"
|
||
|
}
|
||
|
]
|
||
|
}
|