{ "id": "CVE-2024-28753", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-09T00:15:59.923", "lastModified": "2024-03-11T01:32:39.697", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to read the /etc/passwd file via a crafted request." }, { "lang": "es", "value": "RaspAP (tambi\u00e9n conocido como raspap-webgui) hasta la versi\u00f3n 3.0.9 permite a atacantes remotos leer el archivo /etc/passwd mediante una solicitud manipulada." } ], "metrics": {}, "references": [ { "url": "https://dustri.org/b/carrot-disclosure.html", "source": "cve@mitre.org" } ] }