Search criteria

22 vulnerabilities

CVE-2025-14505 (GCVE-0-2025-14505)

Vulnerability from cvelistv5 – Published: 2026-01-08 21:05 – Updated: 2026-01-08 21:22 X_Open Source
VLAI?
Title
Elliptic Cryptanalysis vulnerability when `k` has leading zeros
Summary
The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of 'k' is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result. Furthermore, due to the nature of the fault, attackers could–under certain conditions–derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs. This issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).
CWE
  • CWE-1240 - Use of a Cryptographic Primitive with a Risky Implementation
Assigner
References
Impacted products
Vendor Product Version
N/A Elliptic Affected: <=6.6.1 (semver)
Create a notification for this product.
Credits
Daniel Bleichenbacher Subheader (https://github.com/Subheader) George Kalpakas from HeroDevs
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-14505",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-08T21:22:47.447055Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-08T21:22:55.144Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unknown",
          "packageName": "elliptic",
          "product": "Elliptic",
          "repo": "https://github.com/indutny/elliptic",
          "vendor": "N/A",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=6.6.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Daniel Bleichenbacher"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "Subheader (https://github.com/Subheader)"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "George Kalpakas from HeroDevs"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eThe ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of \u0027\u003ctt\u003ek\u003c/tt\u003e\u0027 (as computed based on step 3.2 of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://datatracker.ietf.org/doc/html/rfc6979\"\u003eRFC 6979\u003c/a\u003e) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of \u0027\u003ctt\u003ek\u003c/tt\u003e\u0027 is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eFurthermore, due to the nature of the fault, attackers could\u2013under certain conditions\u2013derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of \u0027k\u0027 (as computed based on step 3.2 of  RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of \u0027k\u0027 is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result.\u00a0Furthermore, due to the nature of the fault, attackers could\u2013under certain conditions\u2013derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs.\n\nThis issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-97",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-97 Cryptanalysis"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1240",
              "description": "CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-08T21:05:14.800Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-14505"
        },
        {
          "tags": [
            "issue-tracking",
            "exploit"
          ],
          "url": "https://github.com/indutny/elliptic/issues/321"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "Elliptic Cryptanalysis vulnerability when `k` has leading zeros",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-14505",
    "datePublished": "2026-01-08T21:05:14.800Z",
    "dateReserved": "2025-12-10T22:37:46.175Z",
    "dateUpdated": "2026-01-08T21:22:55.144Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-8083 (GCVE-0-2025-8083)

Vulnerability from cvelistv5 – Published: 2025-12-12 19:29 – Updated: 2025-12-12 19:39 Unsupported When Assigned X_Open Source
VLAI?
Title
Vuetify Prototype Pollution via Preset options
Summary
The Preset configuration https://v2.vuetifyjs.com/en/features/presets  feature of Vuetify is vulnerable to Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data. If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process. This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
CWE
  • CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Assigner
References
Impacted products
Vendor Product Version
N/A Vuetify Affected: >=2.2.0-beta.2 <3.0.0-alpha.10 (semver)
Create a notification for this product.
Credits
Christiaan Swiers
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8083",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-12T19:38:59.651424Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-12T19:39:20.731Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "vuetify",
          "product": "Vuetify",
          "repo": "https://github.com/vuetifyjs/vuetify",
          "vendor": "N/A",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=2.2.0-beta.2 \u003c3.0.0-alpha.10",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Christiaan Swiers"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cspan style=\"background-color: transparent;\"\u003eT\u003c/span\u003ehe \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/features/presets\"\u003ePreset configuration\u003c/a\u003e\u0026nbsp;feature of Vuetify is vulnerable to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html\"\u003ePrototype Pollution\u003c/a\u003e\u0026nbsp;due to t\u003c/span\u003ehe internal \u0027\u003ctt\u003emergeDeep\u003c/tt\u003e\u0027 utility function used to merge options with defaults.\u003c/span\u003e\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003eUsing a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application\u0027s behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003cbr\u003eIf the application utilizes\u0026nbsp;Server-Side Rendering (SSR), this vulnerability could affect the whole server process.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003eThis issue affects Vuetify versions greater than or equal to 2.2.0-beta.2\u0026nbsp;and less than \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e3.0.0-alpha.10\u003c/span\u003e.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/about/eol/\"\u003ehere\u003c/a\u003e.\u003cbr\u003e"
            }
          ],
          "value": "The  Preset configuration https://v2.vuetifyjs.com/en/features/presets \u00a0feature of Vuetify is vulnerable to  Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html \u00a0due to the internal \u0027mergeDeep\u0027 utility function used to merge options with defaults.\u00a0Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application\u0027s behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.\n\nIf the application utilizes\u00a0Server-Side Rendering (SSR), this vulnerability could affect the whole server process.\n\nThis issue affects Vuetify versions greater than or equal to 2.2.0-beta.2\u00a0and less than 3.0.0-alpha.10.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-77",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-77 Manipulating User-Controlled Variables"
            }
          ]
        },
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1321",
              "description": "CWE-1321 Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-12T19:29:06.926Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-8083"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/RNWoaQM/f1f4ccc7e6a307c2a8c36d948ba14755"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "Vuetify Prototype Pollution via Preset options",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-8083",
    "datePublished": "2025-12-12T19:29:06.926Z",
    "dateReserved": "2025-07-23T13:08:31.769Z",
    "dateUpdated": "2025-12-12T19:39:20.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-8082 (GCVE-0-2025-8082)

Vulnerability from cvelistv5 – Published: 2025-12-12 18:33 – Updated: 2025-12-12 19:08 Unsupported When Assigned X_Open Source
VLAI?
Title
Vuetify XSS via unsanitized 'titleDateFormat' in 'VDatePicker'
Summary
Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
Vendor Product Version
N/A Vuetify Affected: >=2.0.0 <3.0.0 (semver)
Create a notification for this product.
Credits
Christiaan Swiers
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8082",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-12T19:04:05.872919Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-12T19:08:54.180Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "vuetify",
          "product": "Vuetify",
          "repo": "https://github.com/vuetifyjs/vuetify",
          "vendor": "N/A",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=2.0.0 \u003c3.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Christiaan Swiers"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eImproper neutralization of the title date in the \u0027\u003ctt\u003eVDatePicker\u003c/tt\u003e\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\u0026nbsp;This can lead to a \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/xss\"\u003eCross-Site Scripting (XSS)\u003c/a\u003e\u0026nbsp;attack. The vulnerability occurs because the\u0026nbsp;\u0027\u003ctt\u003etitle-date-format\u003c/tt\u003e\u0027 property of the \u0027\u003ctt\u003eVDatePicker\u003c/tt\u003e\u0027 can accept a user created function and assign its output to the \u0027\u003ctt\u003einnerHTML\u003c/tt\u003e\u0027 property of the title element without sanitization.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003eThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/about/eol/\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper neutralization of the title date in the \u0027VDatePicker\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\u00a0This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss \u00a0attack. The vulnerability occurs because the\u00a0\u0027title-date-format\u0027 property of the \u0027VDatePicker\u0027 can accept a user created function and assign its output to the \u0027innerHTML\u0027 property of the title element without sanitization.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-12T18:33:07.244Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-8082"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/dPYGPyR/775285c0fd5a08038d4c85398815d644"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "Vuetify XSS via unsanitized \u0027titleDateFormat\u0027 in \u0027VDatePicker\u0027",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-8082",
    "datePublished": "2025-12-12T18:33:07.244Z",
    "dateReserved": "2025-07-23T13:08:25.958Z",
    "dateUpdated": "2025-12-12T19:08:54.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-36855 (GCVE-0-2025-36855)

Vulnerability from cvelistv5 – Published: 2025-09-08 13:57 – Updated: 2025-09-08 14:06
VLAI?
Title
EOL .NET 6.0 Runtime Remote Code Execution Vulnerability
Summary
A vulnerability ( CVE-2025-21176 https://www.cve.org/CVERecord ) exists in DiaSymReader.dll due to buffer over-read. Per CWE-126: Buffer Over-read https://cwe.mitre.org/data/definitions/126.html , Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.11 & <= 9.0.0 as represented in CVE-2025-21176. Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd  targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
Assigner
Impacted products
Vendor Product Version
Microsoft .NET 6.0 Affected: 6.0.0 , < 6.0.36 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36855",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T14:06:12.291326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T14:06:24.393Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Unknown"
          ],
          "product": ".NET 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.36",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T08:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability (\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cve.org/CVERecord?id=CVE-2025-21176\"\u003eCVE-2025-21176\u003c/a\u003e) exists in \u003cem\u003eDiaSymReader.dll\u003c/em\u003e\u0026nbsp;due to buffer over-read.\u003c/p\u003e \u003cp\u003ePer \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwe.mitre.org/data/definitions/126.html\"\u003eCWE-126: Buffer Over-read\u003c/a\u003e, Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.\u003c/p\u003e \u003cdiv\u003e \u003cdiv\u003eThis issue affects EOL ASP.NET 6.0.0 \u0026lt;= 6.0.36 as represented in this CVE, as well as 8.0.0 \u0026lt;= 8.0.11 \u0026amp; \u0026lt;= 9.0.0 as represented in\u0026nbsp;CVE-2025-21176.\u003c/div\u003e \u003c/div\u003e \u003cp\u003eAdditionally, if you\u0027ve deployed \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd\"\u003eself-contained applications\u003c/a\u003e\u0026nbsp;targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\u003c/p\u003e \u003cp\u003e\u003cstrong\u003eNOTE:\u003c/strong\u003e\u0026nbsp;This CVE affects only \u003cstrong\u003eEnd Of Life (EOL)\u0026nbsp;\u003c/strong\u003esoftware components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability ( CVE-2025-21176 https://www.cve.org/CVERecord ) exists in DiaSymReader.dll\u00a0due to buffer over-read.\n\n Per  CWE-126: Buffer Over-read https://cwe.mitre.org/data/definitions/126.html , Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.\n\n  This issue affects EOL ASP.NET 6.0.0 \u003c= 6.0.36 as represented in this CVE, as well as 8.0.0 \u003c= 8.0.11 \u0026 \u003c= 9.0.0 as represented in\u00a0CVE-2025-21176.\n\n \n\n Additionally, if you\u0027ve deployed  self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd \u00a0targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\n\n NOTE:\u00a0This CVE affects only End Of Life (EOL)\u00a0software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-126",
              "description": "CWE-126: Buffer Over-read",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T13:57:28.386Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-21176"
        },
        {
          "name": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176"
        }
      ],
      "title": "EOL .NET 6.0 Runtime Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36855",
    "datePublished": "2025-09-08T13:57:28.386Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-09-08T14:06:24.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36854 (GCVE-0-2025-36854)

Vulnerability from cvelistv5 – Published: 2025-09-08 13:53 – Updated: 2025-09-08 14:01
VLAI?
Title
EOL ASP.NET 6.0 Remote Code Execution Vulnerability
Summary
A vulnerability ( CVE-2024-38229 https://www.cve.org/CVERecord ) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution. Per CWE-416: Use After Free https://cwe.mitre.org/data/definitions/416.html , Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.8, 9.0.0-preview.1.24081.5 <= 9.0.0.RC.1 as represented in  CVE-2024-38229 https://www.cve.org/CVERecord . Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd  targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
Assigner
Impacted products
Vendor Product Version
Microsoft .NET 6.0 Affected: 6.0.0 , ≤ 6.0.36 (custom)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.Identity Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x86 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36854",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T14:01:05.268290Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T14:01:20.382Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Unknown"
          ],
          "product": ".NET 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.Identity",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-09-03T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability (\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cve.org/CVERecord?id=CVE-2024-38229\"\u003eCVE-2024-38229\u003c/a\u003e) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution.\u003c/p\u003e  \u003cp\u003ePer \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwe.mitre.org/data/definitions/416.html\"\u003eCWE-416: Use After Free\u003c/a\u003e, Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory \"belongs\" to the code that operates on the new pointer.\u003c/p\u003e  \u003cp\u003eThis issue affects EOL ASP.NET\u0026nbsp;6.0.0 \u0026lt;= 6.0.36 as represented in this CVE, as well as\u0026nbsp;8.0.0 \u0026lt;= 8.0.8, 9.0.0-preview.1.24081.5 \u0026lt;= 9.0.0.RC.1 as represented in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cve.org/CVERecord?id=CVE-2024-38229\"\u003eCVE-2024-38229\u003c/a\u003e.\u003c/p\u003e  \u003cp\u003eAdditionally, if you\u0027ve deployed \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd\"\u003eself-contained applications\u003c/a\u003e\u0026nbsp;targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\u003c/p\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eNOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e"
            }
          ],
          "value": "A vulnerability ( CVE-2024-38229 https://www.cve.org/CVERecord ) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution.\n\n  Per  CWE-416: Use After Free https://cwe.mitre.org/data/definitions/416.html , Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory \"belongs\" to the code that operates on the new pointer.\n\n  This issue affects EOL ASP.NET\u00a06.0.0 \u003c= 6.0.36 as represented in this CVE, as well as\u00a08.0.0 \u003c= 8.0.8, 9.0.0-preview.1.24081.5 \u003c= 9.0.0.RC.1 as represented in\u00a0 CVE-2024-38229 https://www.cve.org/CVERecord .\n\n  Additionally, if you\u0027ve deployed  self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd \u00a0targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\n\n   NOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416: Use After Free",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T13:53:08.619Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": ".NET and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-38229"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229"
        }
      ],
      "title": "EOL ASP.NET 6.0 Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36854",
    "datePublished": "2025-09-08T13:53:08.619Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-09-08T14:01:20.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36853 (GCVE-0-2025-36853)

Vulnerability from cvelistv5 – Published: 2025-09-08 13:48 – Updated: 2025-09-08 13:52
VLAI?
Title
EOL .NET 6.0 Runtime Remote Code Execution Vulnerability
Summary
A vulnerability (CVE-2025-21172) exists in msdia140.dll due to integer overflow and heap-based overflow. Per CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().‍ Per CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
  • CWE-190 - Integer Overflow or Wraparound
  • CWE-122 - Heap-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Microsoft .NET 6.0 Affected: 6.0.0 , < 6.0.36 (custom)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-musl-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-musl-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-musl-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.osx-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.osx-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-x86 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36853",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T13:52:31.457765Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T13:52:43.781Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "product": ".NET 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.36",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-musl-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-musl-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-musl-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.osx-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.osx-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-x86",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T08:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability (CVE-2025-21172) exists in \u003cem\u003emsdia140.dll\u003c/em\u003e\u0026nbsp;due to integer overflow and heap-based overflow.\u003c/p\u003e \u003cp\u003ePer CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as \u003cem\u003emalloc()\u003c/em\u003e.\u200d\u003c/p\u003e \u003cp\u003ePer CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.\u003c/p\u003e \u003cp\u003e\u003cstrong\u003eNOTE:\u003c/strong\u003e This CVE affects only\u003cstrong\u003e End Of Life (EOL)\u003c/strong\u003e\u0026nbsp;software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability (CVE-2025-21172) exists in msdia140.dll\u00a0due to integer overflow and heap-based overflow.\n\n Per CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().\u200d\n\n Per CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.\n\n NOTE: This CVE affects only End Of Life (EOL)\u00a0software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190: Integer Overflow or Wraparound",
              "lang": "en-US",
              "type": "CWE"
            },
            {
              "cweId": "CWE-122",
              "description": "CWE-122: Heap-based Buffer Overflow",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T13:48:43.492Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": ".NET and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-21172"
        },
        {
          "name": ".NET and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172"
        }
      ],
      "title": "EOL .NET 6.0 Runtime Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36853",
    "datePublished": "2025-09-08T13:48:43.492Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-09-08T13:52:43.781Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-4690 (GCVE-0-2025-4690)

Vulnerability from cvelistv5 – Published: 2025-08-19 13:19 – Updated: 2025-08-19 13:35 Unsupported When Assigned X_Open Source
VLAI?
Title
AngularJS 'linky' filter ReDoS
Summary
A regular expression used by AngularJS'  linky https://docs.angularjs.org/api/ngSanitize/filter/linky  filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS  attack on the application. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-1333 - Inefficient Regular Expression Complexity
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=0.0.0 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-4690",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-19T13:26:50.740352Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-19T13:35:50.828Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-4690"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular-sanitize",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A regular expression used by AngularJS\u0027\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/api/ngSanitize/filter/linky\"\u003e\u003ccode\u003elinky\u003c/code\u003e\u003c/a\u003e\u0026nbsp;filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a \n\n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS\"\u003eRegular expression Denial of Service (ReDoS)\u003c/a\u003e\u0026nbsp;attack on\u0026nbsp;the application.\u003cbr\u003e\u003cbr\u003eThis issue affects all versions of AngularJS.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "A regular expression used by AngularJS\u0027\u00a0 linky https://docs.angularjs.org/api/ngSanitize/filter/linky \u00a0filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a \n\n Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS \u00a0attack on\u00a0the application.\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-492",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-492 Regular Expression Exponential Blowup"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333 Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-19T13:19:27.919Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-4690"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS \u0027linky\u0027 filter ReDoS",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-4690",
    "datePublished": "2025-08-19T13:19:27.919Z",
    "dateReserved": "2025-05-14T15:39:08.634Z",
    "dateUpdated": "2025-08-19T13:35:50.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7326 (GCVE-0-2025-7326)

Vulnerability from cvelistv5 – Published: 2025-07-08 14:31 – Updated: 2025-07-22 15:20
VLAI?
Title
EOL ASP.NET Core Elevation of Privilege Vulnerability
Summary
Weak authentication in EOL ASP.NET Core allows an unauthorized attacker to elevate privileges over a network. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
Assigner
Impacted products
Vendor Product Version
Microsoft ASP.NET Core 6.0 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.Identity Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x86 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7326",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-22T15:20:38.013408Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-22T15:20:41.162Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-7326?nes-for-.net"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Unknown"
          ],
          "product": "ASP.NET Core 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.Identity",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-07-08T14:30:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eWeak authentication in \u003cb\u003eEOL\u0026nbsp;\u003c/b\u003eASP.NET Core allows an unauthorized attacker to elevate privileges over a network.\u003c/p\u003e\u003cb\u003e\u003c/b\u003e\u003cp\u003e\u003cb\u003eNOTE:\u003c/b\u003e This CVE affects only\u003cb\u003e End Of Life (EOL)\u003c/b\u003e\u0026nbsp;software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e"
            }
          ],
          "value": "Weak authentication in EOL\u00a0ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.\n\nNOTE: This CVE affects only End Of Life (EOL)\u00a0software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1390",
              "description": "CWE-1390: Weak Authentication",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-10T17:30:15.501Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": "ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability",
          "tags": [
            "related"
          ],
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-24070"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070"
        },
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-7326"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "EOL ASP.NET Core Elevation of Privilege Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-7326",
    "datePublished": "2025-07-08T14:31:45.633Z",
    "dateReserved": "2025-07-07T15:43:27.241Z",
    "dateUpdated": "2025-07-22T15:20:41.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36852 (GCVE-0-2025-36852)

Vulnerability from cvelistv5 – Published: 2025-06-10 19:23 – Updated: 2025-06-10 21:35
VLAI?
Title
Build Cache Poisoning via Untrusted Pull Requests
Summary
A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.  The vulnerability exploits a fundamental design flaw in the "first-to-cache wins" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).  This attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.
CWE
  • CWE-829 - Inclusion of Functionality from Untrusted Control Sphere
Assigner
References
Impacted products
Vendor Product Version
Niklas Portmann Azure Based Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:niklas_portmann:nx-remotecache-azure:0:*:*:*:*:*:*:*
Create a notification for this product.
    Niklas Portmann Minio Based Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:niklas_portmann:nx-remotecache-minio:0:*:*:*:*:*:*:*
Create a notification for this product.
    Niklas Portmann Nx Remote Cache Utilities Affected: 0 (semver)
    cpe:2.3:a:niklas_portmann:nx-remotecache-custom:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx AWS S3 Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:s3-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx GCS Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:gcs-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx Azure Blob Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:azure-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx Shared File System Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:shared-fs-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36852",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-10T20:12:14.201636Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-10T20:12:58.460Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:niklas_portmann:nx-remotecache-azure:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "nx-remotecache-azure",
          "product": "Azure Based Remote Cache Plugin for Nx",
          "repo": "https://github.com/NiklasPor/nx-remotecache-azure",
          "vendor": "Niklas Portmann",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:niklas_portmann:nx-remotecache-minio:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "nx-remotecache-minio",
          "product": "Minio Based Remote Cache Plugin for Nx",
          "repo": "https://github.com/NiklasPor/nx-remotecache-minio",
          "vendor": "Niklas Portmann",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:niklas_portmann:nx-remotecache-custom:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "nx-remotecache-custom",
          "product": "Nx Remote Cache Utilities",
          "repo": "https://github.com/NiklasPor/nx-remotecache-custom",
          "vendor": "Niklas Portmann",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:s3-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/s3-cache",
          "product": "AWS S3 Remote Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:gcs-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/gcs-cache",
          "product": "GCS Remote Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:azure-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/azure-cache",
          "product": "Azure Blob Remote Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:shared-fs-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/shared-fs-cache",
          "product": "Shared File System Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003eA critical security vulnerability exists in \u003cb\u003eremote cache extensions\u003c/b\u003e for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.\u0026nbsp;\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003eThe vulnerability exploits a fundamental design flaw in the \"first-to-cache wins\" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).\u0026nbsp;\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.\u003c/span\u003e\u003c/div\u003e"
            }
          ],
          "value": "A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.\u00a0\n\n\n\n\nThe vulnerability exploits a fundamental design flaw in the \"first-to-cache wins\" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).\u00a0\n\n\n\n\nThis attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-141",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-141 Cache Poisoning"
            }
          ]
        },
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-438",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-438 Modification During Manufacture"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "YES",
            "Recovery": "USER",
            "Safety": "PRESENT",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "LOW",
            "providerUrgency": "RED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "CONCENTRATED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:C/RE:M/U:Red",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "MODERATE"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-829",
              "description": "CWE-829 Inclusion of Functionality from Untrusted Control Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-10T21:35:37.274Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://nx.app/files/cve-2025-06"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Build Cache Poisoning via Untrusted Pull Requests",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36852",
    "datePublished": "2025-06-10T19:23:33.956Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-06-10T21:35:37.274Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2336 (GCVE-0-2025-2336)

Vulnerability from cvelistv5 – Published: 2025-06-04 16:32 – Updated: 2025-11-03 19:43 Unsupported When Assigned X_Open Source
VLAI?
Title
AngularJS improper sanitization in SVG '<image>' element with 'ngSanitize'
Summary
Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's 'ngSanitize' module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects AngularJS versions greater than or equal to 1.3.1. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-791 - Incomplete Filtering of Special Elements
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=1.3.1 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2336",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-04T18:14:00.546895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-04T18:18:58.207Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-2336?angularjs-nes"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:43:05.229Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular-sanitize",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=1.3.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u0027\u003ctt\u003ehref\u003c/tt\u003e\u0027 and \u0027\u003ctt\u003exlink:href\u003c/tt\u003e\u0027 attributes in \u0027\u003ctt\u003e\u0026lt;image\u0026gt;\u003c/tt\u003e\u0027 SVG elements in AngularJS\u0027s\u0026nbsp;\u0027\u003ctt\u003engSanitize\u003c/tt\u003e\u0027\u0026nbsp;module allows attackers to bypass common image source restrictions. This can lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e\u0026nbsp;and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\u003cbr\u003e\u003cbr\u003eThis issue affects AngularJS versions greater than or equal to 1.3.1.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e.\u003cbr\u003e"
            }
          ],
          "value": "Improper sanitization of the value of the \u0027href\u0027 and \u0027xlink:href\u0027 attributes in \u0027\u003cimage\u003e\u0027 SVG elements in AngularJS\u0027s\u00a0\u0027ngSanitize\u0027\u00a0module allows attackers to bypass common image source restrictions. This can lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing \u00a0and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\n\nThis issue affects AngularJS versions greater than or equal to 1.3.1.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-791",
              "description": "CWE-791: Incomplete Filtering of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-04T16:35:08.675Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-2336"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/bNGYaXx/412a3a4218387479898912f60c269c6c"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in SVG \u0027\u003cimage\u003e\u0027 element with \u0027ngSanitize\u0027",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-2336",
    "datePublished": "2025-06-04T16:32:31.665Z",
    "dateReserved": "2025-03-15T11:48:06.541Z",
    "dateUpdated": "2025-11-03T19:43:05.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-1461 (GCVE-0-2025-1461)

Vulnerability from cvelistv5 – Published: 2025-05-28 17:26 – Updated: 2025-05-29 19:02 Unsupported When Assigned X_Open Source
VLAI?
Title
Vuetify XSS through 'eventMoreText' prop of VCalendar
Summary
Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
Vendor Product Version
N/A Vuetify Affected: >=2.0.0 <3.0.0 (semver)
Create a notification for this product.
Credits
abze
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1461",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-29T19:01:31.139781Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-29T19:02:08.446Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "vuetify",
          "product": "Vuetify",
          "repo": "https://github.com/vuetifyjs/vuetify",
          "vendor": "N/A",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=2.0.0 \u003c3.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "abze"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper neutralization of the value of the \u0027\u003ctt\u003eeventMoreText\u003c/tt\u003e\u0027 property of the \u0027\u003ctt\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVCalendar\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0027 component\u0026nbsp;\u003c/span\u003ein Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/xss\"\u003eCross-Site Scripting (XSS)\u003c/a\u003e\u0026nbsp;attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can\u0027t find an actual translation.\u003cbr\u003e\u003cbr\u003eThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/about/eol/\"\u003ehere\u003c/a\u003e.\u003cbr\u003e"
            }
          ],
          "value": "Improper neutralization of the value of the \u0027eventMoreText\u0027 property of the \u0027VCalendar\u0027 component\u00a0in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a\u00a0 Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss \u00a0attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can\u0027t find an actual translation.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:27:41.127Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-1461"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "Vuetify XSS through \u0027eventMoreText\u0027 prop of VCalendar",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-1461",
    "datePublished": "2025-05-28T17:26:51.320Z",
    "dateReserved": "2025-02-18T20:50:31.387Z",
    "dateUpdated": "2025-05-29T19:02:08.446Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1647 (GCVE-0-2025-1647)

Vulnerability from cvelistv5 – Published: 2025-05-15 16:26 – Updated: 2025-06-01 11:02
VLAI?
Title
XSS in Bootstrap title attribute for Tooltip and Popover
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Bootstrap Bootstrap Affected: 3.4.1 , < 4.0.0 (semver)
Create a notification for this product.
Credits
Johan Carlsson (joaxcar)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1647",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-15T20:03:33.381810Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-15T20:06:50.236Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-06-01T11:02:28.106Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Bootstrap",
          "vendor": "Bootstrap",
          "versions": [
            {
              "lessThan": "4.0.0",
              "status": "affected",
              "version": "3.4.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Johan Carlsson (joaxcar)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Bootstrap allows Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects Bootstrap: from 3.4.1 before 4.0.0.\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-15T16:26:07.587Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-1647"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "XSS in Bootstrap title attribute for Tooltip and Popover",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-1647",
    "datePublished": "2025-05-15T16:26:07.587Z",
    "dateReserved": "2025-02-24T18:35:21.344Z",
    "dateUpdated": "2025-06-01T11:02:28.106Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0716 (GCVE-0-2025-0716)

Vulnerability from cvelistv5 – Published: 2025-04-29 16:26 – Updated: 2025-11-03 19:35 Unsupported When Assigned X_Open Source
VLAI?
Title
AngularJS improper sanitization in SVG '<image>' element
Summary
Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-791 - Incomplete Filtering of Special Elements
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=0.0.0 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0716",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-29T18:33:33.752366Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T18:33:37.801Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-0716"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:35:06.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u0027\u003ctt\u003ehref\u003c/tt\u003e\u0027 and \u0027\u003ctt\u003exlink:href\u003c/tt\u003e\u0027 attributes in \u0027\u003ctt\u003e\u0026lt;image\u0026gt;\u003c/tt\u003e\u0027 SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e\u0026nbsp;and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\u003cbr\u003e\u003cbr\u003eThis issue affects all versions of AngularJS.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper sanitization of the value of the \u0027href\u0027 and \u0027xlink:href\u0027 attributes in \u0027\u003cimage\u003e\u0027 SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing \u00a0and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-791",
              "description": "CWE-791: Incomplete Filtering of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:37:44.700Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-0716"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in SVG \u0027\u003cimage\u003e\u0027 element",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-0716",
    "datePublished": "2025-04-29T16:26:19.591Z",
    "dateReserved": "2025-01-24T17:15:53.003Z",
    "dateUpdated": "2025-11-03T19:35:06.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-10491 (GCVE-0-2024-10491)

Vulnerability from cvelistv5 – Published: 2024-10-29 16:23 – Updated: 2024-10-29 19:44
VLAI?
Title
Preload arbitrary resources by injecting additional `Link` headers
Summary
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.
CWE
  • CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Assigner
Impacted products
Vendor Product Version
express express Affected: 3.0.0-alpha1 , ≤ 3.21.2 (semver)
Create a notification for this product.
Credits
abze
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:expressjs:express:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "express",
            "vendor": "expressjs",
            "versions": [
              {
                "lessThanOrEqual": "3.21.2",
                "status": "affected",
                "version": "3.0.0-alpha1",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-10491",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-29T19:42:55.922371Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-29T19:44:30.890Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://www.npmjs.com/package/express",
          "defaultStatus": "unaffected",
          "packageName": "express",
          "product": "express",
          "repo": "https://github.com/expressjs/express",
          "vendor": "express",
          "versions": [
            {
              "lessThanOrEqual": "3.21.2",
              "status": "affected",
              "version": "3.0.0-alpha1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "abze"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability has been identified in the Express \u003cem\u003eresponse.links\u003c/em\u003e\u0026nbsp;function, allowing for arbitrary resource injection in the \u003cem\u003eLink\u003c/em\u003e\u0026nbsp;header when unsanitized data is used.\u003c/p\u003e\u003cp\u003eThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `\u0026lt;\u0026gt;` to preload malicious resources.\u003c/p\u003e\u003cp\u003eThis vulnerability is especially relevant for dynamic parameters.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "A vulnerability has been identified in the Express response.links\u00a0function, allowing for arbitrary resource injection in the Link\u00a0header when unsanitized data is used.\n\nThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `\u003c\u003e` to preload malicious resources.\n\nThis vulnerability is especially relevant for dynamic parameters."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-240",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-240 Resource Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-29T16:26:16.251Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-10491"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Preload arbitrary resources by injecting additional `Link` headers",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-10491",
    "datePublished": "2024-10-29T16:23:21.219Z",
    "dateReserved": "2024-10-29T11:53:00.416Z",
    "dateUpdated": "2024-10-29T19:44:30.890Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9506 (GCVE-0-2024-9506)

Vulnerability from cvelistv5 – Published: 2024-10-15 15:40 – Updated: 2024-10-15 16:10
VLAI?
Title
Regular Expression Denial of Service (ReDoS)
Summary
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
CWE
  • CWE-1333 - Inefficient Regular Expression Complexity
Assigner
Impacted products
Vendor Product Version
vue vue Affected: 2.0.0 , ≤ 2.7.16 (semver)
Create a notification for this product.
Credits
K
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9506",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T16:10:46.075149Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-15T16:10:56.576Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "vue",
          "vendor": "vue",
          "versions": [
            {
              "lessThanOrEqual": "2.7.16",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "K"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper regular expression in Vue\u0027s parseHTML function leads to a potential regular expression denial of service vulnerability."
            }
          ],
          "value": "Improper regular expression in Vue\u0027s parseHTML function leads to a potential regular expression denial of service vulnerability."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-492",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-492 Regular Expression Exponential Blowup"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333 Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-15T15:40:04.627Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-9506"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Regular Expression Denial of Service (ReDoS)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-9506",
    "datePublished": "2024-10-15T15:40:04.627Z",
    "dateReserved": "2024-10-03T22:32:46.410Z",
    "dateUpdated": "2024-10-15T16:10:56.576Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9266 (GCVE-0-2024-9266)

Vulnerability from cvelistv5 – Published: 2024-10-03 18:56 – Updated: 2024-10-03 19:20
VLAI?
Title
Open Redirect
Summary
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Express. This vulnerability affects the use of the Express Response object. This issue impacts Express: from 3.4.5 before 4.0.0.
CWE
  • CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Assigner
Impacted products
Vendor Product Version
expressjs express Affected: 3.4.5 , < 4.0.0 (semver)
Create a notification for this product.
Credits
Matvejs Mascenko
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:expressjs:express:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "express",
            "vendor": "expressjs",
            "versions": [
              {
                "lessThan": "4.0.0",
                "status": "affected",
                "version": "3.4.5",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9266",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T19:20:04.211315Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T19:20:08.901Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "express",
          "vendor": "expressjs",
          "versions": [
            {
              "lessThan": "4.0.0",
              "status": "affected",
              "version": "3.4.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Matvejs Mascenko"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Express. This vulnerability affects the use of the Express Response object\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003e\u003cp\u003eThis issue impacts Express: from 3.4.5 before 4.0.0.\u003c/p\u003e"
            }
          ],
          "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Express. This vulnerability affects the use of the Express Response object. This issue impacts Express: from 3.4.5 before 4.0.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-03T18:56:38.143Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-9266"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Open Redirect",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-9266",
    "datePublished": "2024-10-03T18:56:38.143Z",
    "dateReserved": "2024-09-26T20:56:39.726Z",
    "dateUpdated": "2024-10-03T19:20:08.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-8373 (GCVE-0-2024-8373)

Vulnerability from cvelistv5 – Published: 2024-09-09 14:48 – Updated: 2025-11-03 19:34 Unsupported When Assigned X_Open Source
VLAI?
Title
AngularJS improper sanitization in '<source>' element
Summary
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-791 - Incomplete Filtering of Special Elements
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=0.0.0 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "angular.js",
            "vendor": "angularjs",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8373",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-09T15:04:03.093398Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-09T15:06:07.489Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:59.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://security.netapp.com/advisory/ntap-20241122-0003/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u003ctt\u003e[srcset]\u003c/tt\u003e attribute in \u003ctt\u003e\u0026lt;source\u0026gt;\u003c/tt\u003e HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e.\u003cbr\u003e\u003cbr\u003eThis issue affects all versions of AngularJS.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper sanitization of the value of the [srcset] attribute in \u003csource\u003e HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-791",
              "description": "CWE-791: Incomplete Filtering of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:39:12.299Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-8373"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/full/bGPQgMp/8da9ce87e99403ee13a295c305ebfa0b"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in \u0027\u003csource\u003e\u0027 element",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-8373",
    "datePublished": "2024-09-09T14:48:41.513Z",
    "dateReserved": "2024-09-02T08:44:29.571Z",
    "dateUpdated": "2025-11-03T19:34:59.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-8372 (GCVE-0-2024-8372)

Vulnerability from cvelistv5 – Published: 2024-09-09 14:46 – Updated: 2025-11-03 19:34 Unsupported When Assigned X_Open Source
VLAI?
Title
AngularJS improper sanitization in 'srcset' attribute
Summary
Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-1289 - Improper Validation of Unsafe Equivalence in Input
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=1.3.0-rc.4 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "angular.js",
            "vendor": "angularjs",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "1.3.0-rc.4",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8372",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-09T15:06:37.579433Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-09T15:07:26.780Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:58.181Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://security.netapp.com/advisory/ntap-20241122-0002/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=1.3.0-rc.4",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u0027\u003ctt\u003esrcset\u003c/tt\u003e\u0027 attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e.\u003cbr\u003e\u003cbr\u003eThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper sanitization of the value of the \u0027srcset\u0027 attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1289",
              "description": "CWE-1289: Improper Validation of Unsafe Equivalence in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:39:48.004Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-8372"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/full/xxoQRNL/0072e627abe03e9cda373bc75b4c1017"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in \u0027srcset\u0027 attribute",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-8372",
    "datePublished": "2024-09-09T14:46:03.134Z",
    "dateReserved": "2024-09-02T08:44:11.786Z",
    "dateUpdated": "2025-11-03T19:34:58.181Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-6783 (GCVE-0-2024-6783)

Vulnerability from cvelistv5 – Published: 2024-07-23 15:05 – Updated: 2024-08-30 14:51
VLAI?
Title
Vue client-side XSS via prototype pollution
Summary
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
vue vue Affected: 2.0.0 , ≤ 2.7.16 (semver)
Create a notification for this product.
Credits
Zifeng Kang Muxi Lyu Yinzhi Cao
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:vuejs:vue:2.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vue",
            "vendor": "vuejs",
            "versions": [
              {
                "lessThanOrEqual": "2.7.16",
                "status": "affected",
                "version": "2.0.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6783",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-23T16:11:39.290995Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-23T16:19:34.302Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-12T20:50:45.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory"
            ],
            "url": "https://github.com/advisories/GHSA-g3ch-rx76-35fx"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "vue",
          "vendor": "vue",
          "versions": [
            {
              "lessThanOrEqual": "2.7.16",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zifeng Kang"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Muxi Lyu"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Yinzhi Cao"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code."
            }
          ],
          "value": "A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-30T14:51:11.346Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6783"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Vue client-side XSS via prototype pollution",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6783",
    "datePublished": "2024-07-23T15:05:57.752Z",
    "dateReserved": "2024-07-16T06:55:56.434Z",
    "dateUpdated": "2024-08-30T14:51:11.346Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6531 (GCVE-0-2024-6531)

Vulnerability from cvelistv5 – Published: 2024-07-11 17:15 – Updated: 2025-08-01 17:12
VLAI?

This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-08-01T17:12:55.431Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
            }
          ],
          "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6531",
    "datePublished": "2024-07-11T17:15:57.820Z",
    "dateRejected": "2025-08-01T17:12:55.431Z",
    "dateReserved": "2024-07-05T13:56:42.257Z",
    "dateUpdated": "2025-08-01T17:12:55.431Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6485 (GCVE-0-2024-6485)

Vulnerability from cvelistv5 – Published: 2024-07-11 17:08 – Updated: 2025-11-03 19:34
VLAI?
Title
XSS in Bootstrap button component
Summary
A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Bootstrap Bootstrap Affected: 1.4.0 , ≤ 3.4.1 (semver)
Create a notification for this product.
    Bootstrap-sass bootstrap-sass Affected: 2.3.2 , ≤ 3.4.3 (semver)
Create a notification for this product.
Credits
K
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "bootstrap",
            "vendor": "getbootstrap",
            "versions": [
              {
                "lessThanOrEqual": "3.4.1",
                "status": "affected",
                "version": "2.0.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6485",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-11T18:49:37.849230Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-11T20:01:02.497Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:34.709Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6485"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Bootstrap",
          "vendor": "Bootstrap",
          "versions": [
            {
              "lessThanOrEqual": "3.4.1",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "bootstrap-sass",
          "vendor": "Bootstrap-sass",
          "versions": [
            {
              "lessThanOrEqual": "3.4.3",
              "status": "affected",
              "version": "2.3.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "K"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the \u003c/span\u003e\u003ccode\u003edata-loading-text\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e attribute within the \u003c/span\u003e\u003ccode\u003ebutton\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button\u0027s loading state is triggered.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button\u0027s loading state is triggered."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T19:15:39.832Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6485"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "XSS in Bootstrap button component",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6485",
    "datePublished": "2024-07-11T17:08:08.224Z",
    "dateReserved": "2024-07-03T16:54:39.173Z",
    "dateUpdated": "2025-11-03T19:34:34.709Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-6484 (GCVE-0-2024-6484)

Vulnerability from cvelistv5 – Published: 2024-07-11 17:03 – Updated: 2025-08-01 17:09
VLAI?

This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-08-01T17:09:30.604Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
            }
          ],
          "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6484",
    "datePublished": "2024-07-11T17:03:30.969Z",
    "dateRejected": "2025-08-01T17:08:00.300Z",
    "dateReserved": "2024-07-03T16:54:37.618Z",
    "dateUpdated": "2025-08-01T17:09:30.604Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}