2024-05-28 22:03:31 +00:00
{
"id" : "CVE-2024-28060" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-05-28T20:16:35.747" ,
2025-03-13 15:03:52 +00:00
"lastModified" : "2025-03-13T14:15:24.730" ,
2024-05-29 14:04:39 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-28 22:03:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in Apiris Kafeo 6.4.4. It permits DLL hijacking, allowing a user to trigger the execution of arbitrary code every time the product is executed."
2024-05-29 14:04:39 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en Apiris Kafeo 6.4.4. Permite el secuestro de DLL, lo que permite al usuario activar la ejecuci\u00f3n de c\u00f3digo arbitrario cada vez que se ejecuta el producto."
2024-05-28 22:03:31 +00:00
}
] ,
2025-03-13 15:03:52 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.3 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.3 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-426"
}
]
}
] ,
2024-05-28 22:03:31 +00:00
"references" : [
{
"url" : "https://excellium-services.com/cert-xlm-advisory/cve-2024-28060/" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://excellium-services.com/cert-xlm-advisory/cve-2024-28060/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-05-28 22:03:31 +00:00
}
]
}