{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T23:26:15.650","vulnerabilities":[{"cve":{"id":"CVE-2024-38318","sourceIdentifier":"psirt@us.ibm.com","published":"2025-02-05T23:15:09.557","lastModified":"2025-03-07T19:42:33.557","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Aspera Shares 1.9.0 through 1.10.0 PL6 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site."},{"lang":"es","value":" IBM Aspera Shares 1.9.0 a 1.10.0 PL6 es vulnerable a la inyección HTML. Un atacante remoto podría inyectar un código HTML malicioso, que cuando se ve, se ejecutaría en el navegador web de la víctima dentro del contexto de seguridad del sitio de alojamiento."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-80"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.0","versionEndExcluding":"1.10.0","matchCriteriaId":"E811DC53-703B-4AE3-875C-B351B0835777"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*","matchCriteriaId":"39D4EC3F-C3DB-4866-B1FB-CE44E8F67D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*","matchCriteriaId":"09296CB1-A4C2-4266-B1E6-371A3EE17793"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*","matchCriteriaId":"093500E5-B15F-4935-B570-E0550C680004"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*","matchCriteriaId":"CD806ECB-AE0A-4D28-9F19-C7E803CCC81C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level4:*:*:*:*:*:*","matchCriteriaId":"AB8148AE-3573-4E5F-BB8F-ADB5D37D3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level5:*:*:*:*:*:*","matchCriteriaId":"38D10CB8-E290-4B6B-8896-7D52A191B8C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level6:*:*:*:*:*:*","matchCriteriaId":"40E92215-7CE0-4709-9FB5-157EE2736161"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7182490","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}