mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
33 lines
1.1 KiB
JSON
33 lines
1.1 KiB
JSON
{
|
|
"id": "CVE-2024-44097",
|
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
|
"published": "2024-10-02T14:15:05.670",
|
|
"lastModified": "2024-10-02T14:15:05.670",
|
|
"vulnStatus": "Received",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "According to the researcher: \"The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server.\""
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "dsap-vuln-management@google.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-269"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.google.com/product-documentation/answer/14950962?sjid=9489879942601373169-NA",
|
|
"source": "dsap-vuln-management@google.com"
|
|
}
|
|
]
|
|
} |