{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-50583","assignerOrgId":"f9629fae-ca2e-4fbf-9785-3ed86476aef6","state":"PUBLISHED","assignerShortName":"naver","dateReserved":"2024-10-25T02:33:47.691Z","datePublished":"2024-10-25T07:04:30.244Z","dateUpdated":"2024-10-25T20:17:21.221Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427 Uncontrolled Search Path Element","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"NAVER","product":"Naver Whale browser Installer","platforms":["Windows"],"versions":[{"status":"unaffected","version":"3.1.0.0"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"Whale browser Installer before 3.1.0.0 allows an attacker to execute a malicious DLL in the user environment due to improper permission settings."}],"credits":[{"lang":"en","value":"Guenoh Park (Groro90), spear@kakao.com","type":"finder"}],"references":[{"name":"NAVER Security Advisory","tags":["vendor-advisory"],"url":"https://cve.naver.com/detail/cve-2024-50583.html"}],"source":{"discovery":"EXTERNAL"},"providerMetadata":{"orgId":"f9629fae-ca2e-4fbf-9785-3ed86476aef6","shortName":"naver","dateUpdated":"2024-10-25T07:04:30.244Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-25T20:16:26.441614Z","id":"CVE-2024-50583","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-25T20:17:21.221Z"}}]}}