{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T20:08:53.134","vulnerabilities":[{"cve":{"id":"CVE-2024-38317","sourceIdentifier":"psirt@us.ibm.com","published":"2025-02-05T23:15:09.407","lastModified":"2025-03-07T19:41:32.613","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Aspera Shares 1.9.0 through 1.10.0 PL6  is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."},{"lang":"es","value":"IBM Aspera Shares 1.9.0 a 1.10.0 PL6 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a un usuario privilegiado incrustar el código de JavaScript arbitrario en la interfaz de usuario web, alterando así la funcionalidad prevista potencialmente que conduce a la divulgación de credenciales dentro de una sesión confiable."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.0","versionEndExcluding":"1.10.0","matchCriteriaId":"E811DC53-703B-4AE3-875C-B351B0835777"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*","matchCriteriaId":"39D4EC3F-C3DB-4866-B1FB-CE44E8F67D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*","matchCriteriaId":"09296CB1-A4C2-4266-B1E6-371A3EE17793"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*","matchCriteriaId":"093500E5-B15F-4935-B570-E0550C680004"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*","matchCriteriaId":"CD806ECB-AE0A-4D28-9F19-C7E803CCC81C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level4:*:*:*:*:*:*","matchCriteriaId":"AB8148AE-3573-4E5F-BB8F-ADB5D37D3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level5:*:*:*:*:*:*","matchCriteriaId":"38D10CB8-E290-4B6B-8896-7D52A191B8C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level6:*:*:*:*:*:*","matchCriteriaId":"40E92215-7CE0-4709-9FB5-157EE2736161"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7182490","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}