{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T21:06:37.951","vulnerabilities":[{"cve":{"id":"CVE-2024-0054","sourceIdentifier":"product-security@axis.com","published":"2024-03-19T07:15:07.033","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS\nversions for the highlighted flaw. Please refer to the Axis security advisory\nfor more information and solution."},{"lang":"es","value":"Sandro Poppi, miembro del programa AXIS OS Bug Bounty, descubrió que las API de VAPIX local_list.cgi, create_overlay.cgi e irissetup.cgi eran vulnerables a la acumulación de archivos, lo que podría provocar un ataque de agotamiento de recursos. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener más información y soluciones."}],"metrics":{"cvssMetricV31":[{"source":"product-security@axis.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"product-security@axis.com","type":"Secondary","description":[{"lang":"en","value":"CWE-155"}]}],"references":[{"url":"https://www.axis.com/dam/public/76/f3/1d/cve-2024-0054-en-US-432116.pdf","source":"product-security@axis.com"},{"url":"https://www.axis.com/dam/public/76/f3/1d/cve-2024-0054-en-US-432116.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}