mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
28 lines
1.7 KiB
JSON
28 lines
1.7 KiB
JSON
{
|
|
"id": "CVE-2024-21798",
|
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
|
"published": "2024-02-28T23:15:09.453",
|
|
"lastModified": "2024-04-04T01:15:49.953",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los enrutadores de LAN inal\u00e1mbrica ELECOM contienen una vulnerabilidad de cross-site scripting. Supongamos que un usuario administrativo malintencionado configura el producto afectado con contenido especialmente manipulado. Cuando otro usuario administrativo inicia sesi\u00f3n y opera el producto, se puede ejecutar un script arbitrario en el navegador web. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN44166658/",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "https://www.elecom.co.jp/news/security/20240220-01/",
|
|
"source": "vultures@jpcert.or.jp"
|
|
}
|
|
]
|
|
} |