{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T10:11:37.094","vulnerabilities":[{"cve":{"id":"CVE-2024-56470","sourceIdentifier":"psirt@us.ibm.com","published":"2025-02-05T23:15:09.707","lastModified":"2025-03-07T19:43:22.887","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Aspera Shares 1.9.0 through 1.10.0 PL6  is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks."},{"lang":"es","value":"IBM Aspera Shares 1.9.0 a 1.10.0 PL6 es vulnerable a server-side request forgery (SSRF). Esto puede permitir que un atacante autenticado envíe solicitudes no autorizadas desde el sistema, lo que podría provocar la enumeración de la red o facilitar otros ataques."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.0","versionEndExcluding":"1.10.0","matchCriteriaId":"E811DC53-703B-4AE3-875C-B351B0835777"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*","matchCriteriaId":"39D4EC3F-C3DB-4866-B1FB-CE44E8F67D71"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*","matchCriteriaId":"09296CB1-A4C2-4266-B1E6-371A3EE17793"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*","matchCriteriaId":"093500E5-B15F-4935-B570-E0550C680004"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*","matchCriteriaId":"CD806ECB-AE0A-4D28-9F19-C7E803CCC81C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level4:*:*:*:*:*:*","matchCriteriaId":"AB8148AE-3573-4E5F-BB8F-ADB5D37D3AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level5:*:*:*:*:*:*","matchCriteriaId":"38D10CB8-E290-4B6B-8896-7D52A191B8C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level6:*:*:*:*:*:*","matchCriteriaId":"40E92215-7CE0-4709-9FB5-157EE2736161"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7182490","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}