2025-03-04 23:03:49 +00:00

25 lines
995 B
JSON

{
"id": "CVE-2024-56898",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.047",
"lastModified": "2025-03-04T22:15:38.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Broken access control vulnerability in Geovision GV-ASWeb with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56898",
"source": "cve@mitre.org"
}
]
}