{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T15:07:27.585","vulnerabilities":[{"cve":{"id":"CVE-2024-38316","sourceIdentifier":"psirt@us.ibm.com","published":"2025-02-05T23:15:08.480","lastModified":"2025-03-06T21:05:25.850","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Aspera Shares 1.9.0 through 1.10.0 PL6 does not properly rate limit the frequency that an authenticated user can send emails, which could result in email flooding or a denial of service."},{"lang":"es","value":"IBM Aspera Shares 1.9.0 a 1.10.0 PL6 no limita adecuadamente la frecuencia que un usuario autenticado puede enviar correos electrónicos, lo que podría dar lugar a inundaciones por correo electrónico o una negación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.0","versionEndExcluding":"1.10.0","matchCriteriaId":"E811DC53-703B-4AE3-875C-B351B0835777"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*","matchCriteriaId":"39D4EC3F-C3DB-4866-B1FB-CE44E8F67D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*","matchCriteriaId":"09296CB1-A4C2-4266-B1E6-371A3EE17793"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*","matchCriteriaId":"093500E5-B15F-4935-B570-E0550C680004"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*","matchCriteriaId":"CD806ECB-AE0A-4D28-9F19-C7E803CCC81C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level4:*:*:*:*:*:*","matchCriteriaId":"AB8148AE-3573-4E5F-BB8F-ADB5D37D3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level5:*:*:*:*:*:*","matchCriteriaId":"38D10CB8-E290-4B6B-8896-7D52A191B8C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level6:*:*:*:*:*:*","matchCriteriaId":"40E92215-7CE0-4709-9FB5-157EE2736161"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7182490","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}