{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:12:01.777","vulnerabilities":[{"cve":{"id":"CVE-2024-38807","sourceIdentifier":"security@vmware.com","published":"2024-08-23T09:15:07.453","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another."},{"lang":"es","value":"Las aplicaciones que utilizan spring-boot-loader o spring-boot-loader-classic y contienen código personalizado que realiza la verificación de firmas de archivos jar anidados pueden ser vulnerables a la falsificación de firmas cuando el contenido que parece haber sido firmado por un firmante, de hecho, sido firmado por otro."}],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-290"},{"lang":"en","value":"CWE-347"}]}],"references":[{"url":"https://spring.io/security/cve-2024-38807","source":"security@vmware.com"},{"url":"https://security.netapp.com/advisory/ntap-20250117-0006/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}