{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0888","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-25T14:09:09.514Z","datePublished":"2024-01-25T22:00:07.969Z","dateUpdated":"2024-08-23T19:18:20.799Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-25T22:00:07.969Z"},"title":"BORGChat Service Port 7551 denial of service","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"CWE-404 Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"BORGChat","versions":[{"version":"1.0.0 Build 438","status":"affected"}],"modules":["Service Port 7551"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in BORGChat 1.0.0 Build 438. This affects an unknown part of the component Service Port 7551. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252039."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in BORGChat 1.0.0 Build 438 gefunden. Betroffen hiervon ist ein unbekannter Ablauf der Komponente Service Port 7551. Durch das Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}}],"timeline":[{"time":"2024-01-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-25T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-25T15:14:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"fernando.mengali (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.252039","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.252039","tags":["signature","permissions-required"]},{"url":"https://fitoxs.com/vuldb/27-exploit-perl.txt","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:18:18.995Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.252039","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.252039","tags":["signature","permissions-required","x_transferred"]},{"url":"https://fitoxs.com/vuldb/27-exploit-perl.txt","tags":["exploit","x_transferred"]}]},{"affected":[{"vendor":"10n","product":"borgchat","cpes":["cpe:2.3:a:10n:borgchat:1.0.0:build438:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-23T19:10:07.160059Z","id":"CVE-2024-0888","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-23T19:18:20.799Z"}}]}}