Search criteria

19 vulnerabilities

CVE-2025-36855 (GCVE-0-2025-36855)

Vulnerability from cvelistv5 – Published: 2025-09-08 13:57 – Updated: 2025-09-08 14:06
VLAI?
Summary
A vulnerability ( CVE-2025-21176 https://www.cve.org/CVERecord ) exists in DiaSymReader.dll due to buffer over-read. Per CWE-126: Buffer Over-read https://cwe.mitre.org/data/definitions/126.html , Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.11 & <= 9.0.0 as represented in CVE-2025-21176. Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd  targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
Assigner
Impacted products
Vendor Product Version
Microsoft .NET 6.0 Affected: 6.0.0 , < 6.0.36 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36855",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T14:06:12.291326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T14:06:24.393Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Unknown"
          ],
          "product": ".NET 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.36",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T08:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability (\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cve.org/CVERecord?id=CVE-2025-21176\"\u003eCVE-2025-21176\u003c/a\u003e) exists in \u003cem\u003eDiaSymReader.dll\u003c/em\u003e\u0026nbsp;due to buffer over-read.\u003c/p\u003e \u003cp\u003ePer \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwe.mitre.org/data/definitions/126.html\"\u003eCWE-126: Buffer Over-read\u003c/a\u003e, Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.\u003c/p\u003e \u003cdiv\u003e \u003cdiv\u003eThis issue affects EOL ASP.NET 6.0.0 \u0026lt;= 6.0.36 as represented in this CVE, as well as 8.0.0 \u0026lt;= 8.0.11 \u0026amp; \u0026lt;= 9.0.0 as represented in\u0026nbsp;CVE-2025-21176.\u003c/div\u003e \u003c/div\u003e \u003cp\u003eAdditionally, if you\u0027ve deployed \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd\"\u003eself-contained applications\u003c/a\u003e\u0026nbsp;targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\u003c/p\u003e \u003cp\u003e\u003cstrong\u003eNOTE:\u003c/strong\u003e\u0026nbsp;This CVE affects only \u003cstrong\u003eEnd Of Life (EOL)\u0026nbsp;\u003c/strong\u003esoftware components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability ( CVE-2025-21176 https://www.cve.org/CVERecord ) exists in DiaSymReader.dll\u00a0due to buffer over-read.\n\n Per  CWE-126: Buffer Over-read https://cwe.mitre.org/data/definitions/126.html , Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.\n\n  This issue affects EOL ASP.NET 6.0.0 \u003c= 6.0.36 as represented in this CVE, as well as 8.0.0 \u003c= 8.0.11 \u0026 \u003c= 9.0.0 as represented in\u00a0CVE-2025-21176.\n\n \n\n Additionally, if you\u0027ve deployed  self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd \u00a0targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\n\n NOTE:\u00a0This CVE affects only End Of Life (EOL)\u00a0software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-126",
              "description": "CWE-126: Buffer Over-read",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T13:57:28.386Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-21176"
        },
        {
          "name": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176"
        }
      ],
      "title": "EOL .NET 6.0 Runtime Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36855",
    "datePublished": "2025-09-08T13:57:28.386Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-09-08T14:06:24.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36854 (GCVE-0-2025-36854)

Vulnerability from cvelistv5 – Published: 2025-09-08 13:53 – Updated: 2025-09-08 14:01
VLAI?
Summary
A vulnerability ( CVE-2024-38229 https://www.cve.org/CVERecord ) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution. Per CWE-416: Use After Free https://cwe.mitre.org/data/definitions/416.html , Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.8, 9.0.0-preview.1.24081.5 <= 9.0.0.RC.1 as represented in  CVE-2024-38229 https://www.cve.org/CVERecord . Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd  targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
Assigner
Impacted products
Vendor Product Version
Microsoft .NET 6.0 Affected: 6.0.0 , ≤ 6.0.36 (custom)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.Identity Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x86 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36854",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T14:01:05.268290Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T14:01:20.382Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Unknown"
          ],
          "product": ".NET 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.Identity",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-09-03T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability (\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cve.org/CVERecord?id=CVE-2024-38229\"\u003eCVE-2024-38229\u003c/a\u003e) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution.\u003c/p\u003e  \u003cp\u003ePer \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwe.mitre.org/data/definitions/416.html\"\u003eCWE-416: Use After Free\u003c/a\u003e, Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory \"belongs\" to the code that operates on the new pointer.\u003c/p\u003e  \u003cp\u003eThis issue affects EOL ASP.NET\u0026nbsp;6.0.0 \u0026lt;= 6.0.36 as represented in this CVE, as well as\u0026nbsp;8.0.0 \u0026lt;= 8.0.8, 9.0.0-preview.1.24081.5 \u0026lt;= 9.0.0.RC.1 as represented in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cve.org/CVERecord?id=CVE-2024-38229\"\u003eCVE-2024-38229\u003c/a\u003e.\u003c/p\u003e  \u003cp\u003eAdditionally, if you\u0027ve deployed \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd\"\u003eself-contained applications\u003c/a\u003e\u0026nbsp;targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\u003c/p\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eNOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e"
            }
          ],
          "value": "A vulnerability ( CVE-2024-38229 https://www.cve.org/CVERecord ) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution.\n\n  Per  CWE-416: Use After Free https://cwe.mitre.org/data/definitions/416.html , Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory \"belongs\" to the code that operates on the new pointer.\n\n  This issue affects EOL ASP.NET\u00a06.0.0 \u003c= 6.0.36 as represented in this CVE, as well as\u00a08.0.0 \u003c= 8.0.8, 9.0.0-preview.1.24081.5 \u003c= 9.0.0.RC.1 as represented in\u00a0 CVE-2024-38229 https://www.cve.org/CVERecord .\n\n  Additionally, if you\u0027ve deployed  self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd \u00a0targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\n\n   NOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416: Use After Free",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T13:53:08.619Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": ".NET and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-38229"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229"
        }
      ],
      "title": "EOL ASP.NET 6.0 Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36854",
    "datePublished": "2025-09-08T13:53:08.619Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-09-08T14:01:20.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36853 (GCVE-0-2025-36853)

Vulnerability from cvelistv5 – Published: 2025-09-08 13:48 – Updated: 2025-09-08 13:52
VLAI?
Summary
A vulnerability (CVE-2025-21172) exists in msdia140.dll due to integer overflow and heap-based overflow. Per CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().‍ Per CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
  • CWE-190 - Integer Overflow or Wraparound
  • CWE-122 - Heap-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Microsoft .NET 6.0 Affected: 6.0.0 , < 6.0.36 (custom)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-musl-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-musl-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-musl-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.linux-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.osx-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.osx-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.NetCore.App.Runtime.win-x86 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36853",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T13:52:31.457765Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T13:52:43.781Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "product": ".NET 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.36",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-musl-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-musl-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-musl-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.linux-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.osx-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.osx-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.NetCore.App.Runtime.win-x86",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T08:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability (CVE-2025-21172) exists in \u003cem\u003emsdia140.dll\u003c/em\u003e\u0026nbsp;due to integer overflow and heap-based overflow.\u003c/p\u003e \u003cp\u003ePer CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as \u003cem\u003emalloc()\u003c/em\u003e.\u200d\u003c/p\u003e \u003cp\u003ePer CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.\u003c/p\u003e \u003cp\u003e\u003cstrong\u003eNOTE:\u003c/strong\u003e This CVE affects only\u003cstrong\u003e End Of Life (EOL)\u003c/strong\u003e\u0026nbsp;software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability (CVE-2025-21172) exists in msdia140.dll\u00a0due to integer overflow and heap-based overflow.\n\n Per CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().\u200d\n\n Per CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.\n\n NOTE: This CVE affects only End Of Life (EOL)\u00a0software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190: Integer Overflow or Wraparound",
              "lang": "en-US",
              "type": "CWE"
            },
            {
              "cweId": "CWE-122",
              "description": "CWE-122: Heap-based Buffer Overflow",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T13:48:43.492Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": ".NET and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-21172"
        },
        {
          "name": ".NET and Visual Studio Remote Code Execution Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172"
        }
      ],
      "title": "EOL .NET 6.0 Runtime Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36853",
    "datePublished": "2025-09-08T13:48:43.492Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-09-08T13:52:43.781Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-4690 (GCVE-0-2025-4690)

Vulnerability from cvelistv5 – Published: 2025-08-19 13:19 – Updated: 2025-08-19 13:35
VLAI?
Summary
A regular expression used by AngularJS'  linky https://docs.angularjs.org/api/ngSanitize/filter/linky  filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS  attack on the application. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-1333 - Inefficient Regular Expression Complexity
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=0.0.0 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-4690",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-19T13:26:50.740352Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-19T13:35:50.828Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-4690"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular-sanitize",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A regular expression used by AngularJS\u0027\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/api/ngSanitize/filter/linky\"\u003e\u003ccode\u003elinky\u003c/code\u003e\u003c/a\u003e\u0026nbsp;filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a \n\n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS\"\u003eRegular expression Denial of Service (ReDoS)\u003c/a\u003e\u0026nbsp;attack on\u0026nbsp;the application.\u003cbr\u003e\u003cbr\u003eThis issue affects all versions of AngularJS.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "A regular expression used by AngularJS\u0027\u00a0 linky https://docs.angularjs.org/api/ngSanitize/filter/linky \u00a0filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a \n\n Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS \u00a0attack on\u00a0the application.\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-492",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-492 Regular Expression Exponential Blowup"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333 Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-19T13:19:27.919Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-4690"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS \u0027linky\u0027 filter ReDoS",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-4690",
    "datePublished": "2025-08-19T13:19:27.919Z",
    "dateReserved": "2025-05-14T15:39:08.634Z",
    "dateUpdated": "2025-08-19T13:35:50.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7326 (GCVE-0-2025-7326)

Vulnerability from cvelistv5 – Published: 2025-07-08 14:31 – Updated: 2025-07-22 15:20
VLAI?
Summary
Weak authentication in EOL ASP.NET Core allows an unauthorized attacker to elevate privileges over a network. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CWE
Assigner
Impacted products
Vendor Product Version
Microsoft ASP.NET Core 6.0 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.Identity Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.win-x86 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-musl-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.linux-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-arm64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
    Microsoft Microsoft.AspNetCore.App.Runtime.osx-x64 Affected: >=6.0.0 , ≤ 6.0.36 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7326",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-22T15:20:38.013408Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-22T15:20:41.162Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-7326?nes-for-.net"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Unknown"
          ],
          "product": "ASP.NET Core 6.0",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.Identity",
          "platforms": [
            "Windows",
            "Linux",
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.Identity",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "platforms": [
            "Windows"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.win-x86",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "platforms": [
            "Linux"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.linux-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-arm64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "platforms": [
            "MacOS"
          ],
          "product": "Microsoft.AspNetCore.App.Runtime.osx-x64",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "6.0.36",
              "status": "affected",
              "version": "\u003e=6.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-07-08T14:30:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eWeak authentication in \u003cb\u003eEOL\u0026nbsp;\u003c/b\u003eASP.NET Core allows an unauthorized attacker to elevate privileges over a network.\u003c/p\u003e\u003cb\u003e\u003c/b\u003e\u003cp\u003e\u003cb\u003eNOTE:\u003c/b\u003e This CVE affects only\u003cb\u003e End Of Life (EOL)\u003c/b\u003e\u0026nbsp;software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.\u003c/p\u003e"
            }
          ],
          "value": "Weak authentication in EOL\u00a0ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.\n\nNOTE: This CVE affects only End Of Life (EOL)\u00a0software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1390",
              "description": "CWE-1390: Weak Authentication",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-10T17:30:15.501Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "name": "ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability",
          "tags": [
            "related"
          ],
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-24070"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070"
        },
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-7326"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "EOL ASP.NET Core Elevation of Privilege Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-7326",
    "datePublished": "2025-07-08T14:31:45.633Z",
    "dateReserved": "2025-07-07T15:43:27.241Z",
    "dateUpdated": "2025-07-22T15:20:41.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36852 (GCVE-0-2025-36852)

Vulnerability from cvelistv5 – Published: 2025-06-10 19:23 – Updated: 2025-06-10 21:35
VLAI?
Summary
A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.  The vulnerability exploits a fundamental design flaw in the "first-to-cache wins" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).  This attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.
CWE
  • CWE-829 - Inclusion of Functionality from Untrusted Control Sphere
Assigner
References
Impacted products
Vendor Product Version
Niklas Portmann Azure Based Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:niklas_portmann:nx-remotecache-azure:0:*:*:*:*:*:*:*
Create a notification for this product.
    Niklas Portmann Minio Based Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:niklas_portmann:nx-remotecache-minio:0:*:*:*:*:*:*:*
Create a notification for this product.
    Niklas Portmann Nx Remote Cache Utilities Affected: 0 (semver)
    cpe:2.3:a:niklas_portmann:nx-remotecache-custom:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx AWS S3 Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:s3-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx GCS Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:gcs-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx Azure Blob Remote Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:azure-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
    Nx Shared File System Cache Plugin for Nx Affected: 0 (semver)
    cpe:2.3:a:nx:shared-fs-cache:0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36852",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-10T20:12:14.201636Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-10T20:12:58.460Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:niklas_portmann:nx-remotecache-azure:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "nx-remotecache-azure",
          "product": "Azure Based Remote Cache Plugin for Nx",
          "repo": "https://github.com/NiklasPor/nx-remotecache-azure",
          "vendor": "Niklas Portmann",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:niklas_portmann:nx-remotecache-minio:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "nx-remotecache-minio",
          "product": "Minio Based Remote Cache Plugin for Nx",
          "repo": "https://github.com/NiklasPor/nx-remotecache-minio",
          "vendor": "Niklas Portmann",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:niklas_portmann:nx-remotecache-custom:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "nx-remotecache-custom",
          "product": "Nx Remote Cache Utilities",
          "repo": "https://github.com/NiklasPor/nx-remotecache-custom",
          "vendor": "Niklas Portmann",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:s3-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/s3-cache",
          "product": "AWS S3 Remote Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:gcs-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/gcs-cache",
          "product": "GCS Remote Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:azure-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/azure-cache",
          "product": "Azure Blob Remote Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://registry.npmjs.org",
          "cpes": [
            "cpe:2.3:a:nx:shared-fs-cache:0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "affected",
          "packageName": "@nx/shared-fs-cache",
          "product": "Shared File System Cache Plugin for Nx",
          "vendor": "Nx",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003eA critical security vulnerability exists in \u003cb\u003eremote cache extensions\u003c/b\u003e for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.\u0026nbsp;\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003eThe vulnerability exploits a fundamental design flaw in the \"first-to-cache wins\" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).\u0026nbsp;\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.\u003c/span\u003e\u003c/div\u003e"
            }
          ],
          "value": "A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.\u00a0\n\n\n\n\nThe vulnerability exploits a fundamental design flaw in the \"first-to-cache wins\" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).\u00a0\n\n\n\n\nThis attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-141",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-141 Cache Poisoning"
            }
          ]
        },
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-438",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-438 Modification During Manufacture"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "YES",
            "Recovery": "USER",
            "Safety": "PRESENT",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "LOW",
            "providerUrgency": "RED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "CONCENTRATED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:C/RE:M/U:Red",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "MODERATE"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-829",
              "description": "CWE-829 Inclusion of Functionality from Untrusted Control Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-10T21:35:37.274Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://nx.app/files/cve-2025-06"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Build Cache Poisoning via Untrusted Pull Requests",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-36852",
    "datePublished": "2025-06-10T19:23:33.956Z",
    "dateReserved": "2025-04-15T23:50:31.198Z",
    "dateUpdated": "2025-06-10T21:35:37.274Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2336 (GCVE-0-2025-2336)

Vulnerability from cvelistv5 – Published: 2025-06-04 16:32 – Updated: 2025-11-03 19:43
VLAI?
Summary
Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's 'ngSanitize' module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects AngularJS versions greater than or equal to 1.3.1. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-791 - Incomplete Filtering of Special Elements
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=1.3.1 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2336",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-04T18:14:00.546895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-04T18:18:58.207Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-2336?angularjs-nes"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:43:05.229Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular-sanitize",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=1.3.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u0027\u003ctt\u003ehref\u003c/tt\u003e\u0027 and \u0027\u003ctt\u003exlink:href\u003c/tt\u003e\u0027 attributes in \u0027\u003ctt\u003e\u0026lt;image\u0026gt;\u003c/tt\u003e\u0027 SVG elements in AngularJS\u0027s\u0026nbsp;\u0027\u003ctt\u003engSanitize\u003c/tt\u003e\u0027\u0026nbsp;module allows attackers to bypass common image source restrictions. This can lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e\u0026nbsp;and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\u003cbr\u003e\u003cbr\u003eThis issue affects AngularJS versions greater than or equal to 1.3.1.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e.\u003cbr\u003e"
            }
          ],
          "value": "Improper sanitization of the value of the \u0027href\u0027 and \u0027xlink:href\u0027 attributes in \u0027\u003cimage\u003e\u0027 SVG elements in AngularJS\u0027s\u00a0\u0027ngSanitize\u0027\u00a0module allows attackers to bypass common image source restrictions. This can lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing \u00a0and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\n\nThis issue affects AngularJS versions greater than or equal to 1.3.1.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-791",
              "description": "CWE-791: Incomplete Filtering of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-04T16:35:08.675Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-2336"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/bNGYaXx/412a3a4218387479898912f60c269c6c"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in SVG \u0027\u003cimage\u003e\u0027 element with \u0027ngSanitize\u0027",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-2336",
    "datePublished": "2025-06-04T16:32:31.665Z",
    "dateReserved": "2025-03-15T11:48:06.541Z",
    "dateUpdated": "2025-11-03T19:43:05.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-1461 (GCVE-0-2025-1461)

Vulnerability from cvelistv5 – Published: 2025-05-28 17:26 – Updated: 2025-05-29 19:02
VLAI?
Summary
Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
Vendor Product Version
N/A Vuetify Affected: >=2.0.0 <3.0.0 (semver)
Create a notification for this product.
Credits
abze
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1461",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-29T19:01:31.139781Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-29T19:02:08.446Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "vuetify",
          "product": "Vuetify",
          "repo": "https://github.com/vuetifyjs/vuetify",
          "vendor": "N/A",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=2.0.0 \u003c3.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "abze"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper neutralization of the value of the \u0027\u003ctt\u003eeventMoreText\u003c/tt\u003e\u0027 property of the \u0027\u003ctt\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVCalendar\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0027 component\u0026nbsp;\u003c/span\u003ein Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/xss\"\u003eCross-Site Scripting (XSS)\u003c/a\u003e\u0026nbsp;attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can\u0027t find an actual translation.\u003cbr\u003e\u003cbr\u003eThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/about/eol/\"\u003ehere\u003c/a\u003e.\u003cbr\u003e"
            }
          ],
          "value": "Improper neutralization of the value of the \u0027eventMoreText\u0027 property of the \u0027VCalendar\u0027 component\u00a0in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a\u00a0 Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss \u00a0attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can\u0027t find an actual translation.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:27:41.127Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-1461"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "Vuetify XSS through \u0027eventMoreText\u0027 prop of VCalendar",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-1461",
    "datePublished": "2025-05-28T17:26:51.320Z",
    "dateReserved": "2025-02-18T20:50:31.387Z",
    "dateUpdated": "2025-05-29T19:02:08.446Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1647 (GCVE-0-2025-1647)

Vulnerability from cvelistv5 – Published: 2025-05-15 16:26 – Updated: 2025-06-01 11:02
VLAI?
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Bootstrap Bootstrap Affected: 3.4.1 , < 4.0.0 (semver)
Create a notification for this product.
Credits
Johan Carlsson (joaxcar)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1647",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-15T20:03:33.381810Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-15T20:06:50.236Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-06-01T11:02:28.106Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Bootstrap",
          "vendor": "Bootstrap",
          "versions": [
            {
              "lessThan": "4.0.0",
              "status": "affected",
              "version": "3.4.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Johan Carlsson (joaxcar)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Bootstrap allows Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects Bootstrap: from 3.4.1 before 4.0.0.\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-15T16:26:07.587Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-1647"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "XSS in Bootstrap title attribute for Tooltip and Popover",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-1647",
    "datePublished": "2025-05-15T16:26:07.587Z",
    "dateReserved": "2025-02-24T18:35:21.344Z",
    "dateUpdated": "2025-06-01T11:02:28.106Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0716 (GCVE-0-2025-0716)

Vulnerability from cvelistv5 – Published: 2025-04-29 16:26 – Updated: 2025-11-03 19:35
VLAI?
Summary
Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-791 - Incomplete Filtering of Special Elements
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=0.0.0 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0716",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-29T18:33:33.752366Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T18:33:37.801Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-0716"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:35:06.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u0027\u003ctt\u003ehref\u003c/tt\u003e\u0027 and \u0027\u003ctt\u003exlink:href\u003c/tt\u003e\u0027 attributes in \u0027\u003ctt\u003e\u0026lt;image\u0026gt;\u003c/tt\u003e\u0027 SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e\u0026nbsp;and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\u003cbr\u003e\u003cbr\u003eThis issue affects all versions of AngularJS.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper sanitization of the value of the \u0027href\u0027 and \u0027xlink:href\u0027 attributes in \u0027\u003cimage\u003e\u0027 SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing \u00a0and also negatively affect the application\u0027s performance and behavior by using too large or slow-to-load images.\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-791",
              "description": "CWE-791: Incomplete Filtering of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:37:44.700Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-0716"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in SVG \u0027\u003cimage\u003e\u0027 element",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-0716",
    "datePublished": "2025-04-29T16:26:19.591Z",
    "dateReserved": "2025-01-24T17:15:53.003Z",
    "dateUpdated": "2025-11-03T19:35:06.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-10491 (GCVE-0-2024-10491)

Vulnerability from cvelistv5 – Published: 2024-10-29 16:23 – Updated: 2024-10-29 19:44
VLAI?
Summary
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.
CWE
  • CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Assigner
Impacted products
Vendor Product Version
express express Affected: 3.0.0-alpha1 , ≤ 3.21.2 (semver)
Create a notification for this product.
Credits
abze
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:expressjs:express:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "express",
            "vendor": "expressjs",
            "versions": [
              {
                "lessThanOrEqual": "3.21.2",
                "status": "affected",
                "version": "3.0.0-alpha1",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-10491",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-29T19:42:55.922371Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-29T19:44:30.890Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://www.npmjs.com/package/express",
          "defaultStatus": "unaffected",
          "packageName": "express",
          "product": "express",
          "repo": "https://github.com/expressjs/express",
          "vendor": "express",
          "versions": [
            {
              "lessThanOrEqual": "3.21.2",
              "status": "affected",
              "version": "3.0.0-alpha1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "abze"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability has been identified in the Express \u003cem\u003eresponse.links\u003c/em\u003e\u0026nbsp;function, allowing for arbitrary resource injection in the \u003cem\u003eLink\u003c/em\u003e\u0026nbsp;header when unsanitized data is used.\u003c/p\u003e\u003cp\u003eThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `\u0026lt;\u0026gt;` to preload malicious resources.\u003c/p\u003e\u003cp\u003eThis vulnerability is especially relevant for dynamic parameters.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "A vulnerability has been identified in the Express response.links\u00a0function, allowing for arbitrary resource injection in the Link\u00a0header when unsanitized data is used.\n\nThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `\u003c\u003e` to preload malicious resources.\n\nThis vulnerability is especially relevant for dynamic parameters."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-240",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-240 Resource Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-29T16:26:16.251Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-10491"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Preload arbitrary resources by injecting additional `Link` headers",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-10491",
    "datePublished": "2024-10-29T16:23:21.219Z",
    "dateReserved": "2024-10-29T11:53:00.416Z",
    "dateUpdated": "2024-10-29T19:44:30.890Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9506 (GCVE-0-2024-9506)

Vulnerability from cvelistv5 – Published: 2024-10-15 15:40 – Updated: 2024-10-15 16:10
VLAI?
Summary
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
CWE
  • CWE-1333 - Inefficient Regular Expression Complexity
Assigner
Impacted products
Vendor Product Version
vue vue Affected: 2.0.0 , ≤ 2.7.16 (semver)
Create a notification for this product.
Credits
K
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9506",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T16:10:46.075149Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-15T16:10:56.576Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "vue",
          "vendor": "vue",
          "versions": [
            {
              "lessThanOrEqual": "2.7.16",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "K"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper regular expression in Vue\u0027s parseHTML function leads to a potential regular expression denial of service vulnerability."
            }
          ],
          "value": "Improper regular expression in Vue\u0027s parseHTML function leads to a potential regular expression denial of service vulnerability."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-492",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-492 Regular Expression Exponential Blowup"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333 Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-15T15:40:04.627Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-9506"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Regular Expression Denial of Service (ReDoS)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-9506",
    "datePublished": "2024-10-15T15:40:04.627Z",
    "dateReserved": "2024-10-03T22:32:46.410Z",
    "dateUpdated": "2024-10-15T16:10:56.576Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9266 (GCVE-0-2024-9266)

Vulnerability from cvelistv5 – Published: 2024-10-03 18:56 – Updated: 2024-10-03 19:20
VLAI?
Summary
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Express. This vulnerability affects the use of the Express Response object. This issue impacts Express: from 3.4.5 before 4.0.0.
CWE
  • CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Assigner
Impacted products
Vendor Product Version
expressjs express Affected: 3.4.5 , < 4.0.0 (semver)
Create a notification for this product.
Credits
Matvejs Mascenko
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:expressjs:express:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "express",
            "vendor": "expressjs",
            "versions": [
              {
                "lessThan": "4.0.0",
                "status": "affected",
                "version": "3.4.5",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9266",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-03T19:20:04.211315Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-03T19:20:08.901Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "express",
          "vendor": "expressjs",
          "versions": [
            {
              "lessThan": "4.0.0",
              "status": "affected",
              "version": "3.4.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Matvejs Mascenko"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Express. This vulnerability affects the use of the Express Response object\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003e\u003cp\u003eThis issue impacts Express: from 3.4.5 before 4.0.0.\u003c/p\u003e"
            }
          ],
          "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Express. This vulnerability affects the use of the Express Response object. This issue impacts Express: from 3.4.5 before 4.0.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-03T18:56:38.143Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-9266"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Open Redirect",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-9266",
    "datePublished": "2024-10-03T18:56:38.143Z",
    "dateReserved": "2024-09-26T20:56:39.726Z",
    "dateUpdated": "2024-10-03T19:20:08.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-8373 (GCVE-0-2024-8373)

Vulnerability from cvelistv5 – Published: 2024-09-09 14:48 – Updated: 2025-11-03 19:34
VLAI?
Summary
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-791 - Incomplete Filtering of Special Elements
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=0.0.0 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "angular.js",
            "vendor": "angularjs",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8373",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-09T15:04:03.093398Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-09T15:06:07.489Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:59.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://security.netapp.com/advisory/ntap-20241122-0003/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u003ctt\u003e[srcset]\u003c/tt\u003e attribute in \u003ctt\u003e\u0026lt;source\u0026gt;\u003c/tt\u003e HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e.\u003cbr\u003e\u003cbr\u003eThis issue affects all versions of AngularJS.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper sanitization of the value of the [srcset] attribute in \u003csource\u003e HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-791",
              "description": "CWE-791: Incomplete Filtering of Special Elements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:39:12.299Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-8373"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/full/bGPQgMp/8da9ce87e99403ee13a295c305ebfa0b"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in \u0027\u003csource\u003e\u0027 element",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-8373",
    "datePublished": "2024-09-09T14:48:41.513Z",
    "dateReserved": "2024-09-02T08:44:29.571Z",
    "dateUpdated": "2025-11-03T19:34:59.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-8372 (GCVE-0-2024-8372)

Vulnerability from cvelistv5 – Published: 2024-09-09 14:46 – Updated: 2025-11-03 19:34
VLAI?
Summary
Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
CWE
  • CWE-1289 - Improper Validation of Unsafe Equivalence in Input
Assigner
References
Impacted products
Vendor Product Version
Google AngularJS Affected: >=1.3.0-rc.4 (semver)
Create a notification for this product.
Credits
George Kalpakas
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "angular.js",
            "vendor": "angularjs",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "1.3.0-rc.4",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8372",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-09T15:06:37.579433Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-09T15:07:26.780Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:58.181Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://security.netapp.com/advisory/ntap-20241122-0002/"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "angular",
          "product": "AngularJS",
          "repo": "https://github.com/angular/angular.js",
          "vendor": "Google",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=1.3.0-rc.4",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "George Kalpakas"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper sanitization of the value of the \u0027\u003ctt\u003esrcset\u003c/tt\u003e\u0027 attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/Content_Spoofing\"\u003eContent Spoofing\u003c/a\u003e.\u003cbr\u003e\u003cbr\u003eThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.angularjs.org/misc/version-support-status\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper sanitization of the value of the \u0027srcset\u0027 attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1289",
              "description": "CWE-1289: Improper Validation of Unsafe Equivalence in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T17:39:48.004Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-8372"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/full/xxoQRNL/0072e627abe03e9cda373bc75b4c1017"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "AngularJS improper sanitization in \u0027srcset\u0027 attribute",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-8372",
    "datePublished": "2024-09-09T14:46:03.134Z",
    "dateReserved": "2024-09-02T08:44:11.786Z",
    "dateUpdated": "2025-11-03T19:34:58.181Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-6783 (GCVE-0-2024-6783)

Vulnerability from cvelistv5 – Published: 2024-07-23 15:05 – Updated: 2024-08-30 14:51
VLAI?
Summary
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
vue vue Affected: 2.0.0 , ≤ 2.7.16 (semver)
Create a notification for this product.
Credits
Zifeng Kang Muxi Lyu Yinzhi Cao
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:vuejs:vue:2.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vue",
            "vendor": "vuejs",
            "versions": [
              {
                "lessThanOrEqual": "2.7.16",
                "status": "affected",
                "version": "2.0.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6783",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-23T16:11:39.290995Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-23T16:19:34.302Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-12T20:50:45.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory"
            ],
            "url": "https://github.com/advisories/GHSA-g3ch-rx76-35fx"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "vue",
          "vendor": "vue",
          "versions": [
            {
              "lessThanOrEqual": "2.7.16",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zifeng Kang"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Muxi Lyu"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Yinzhi Cao"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code."
            }
          ],
          "value": "A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-30T14:51:11.346Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6783"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Vue client-side XSS via prototype pollution",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6783",
    "datePublished": "2024-07-23T15:05:57.752Z",
    "dateReserved": "2024-07-16T06:55:56.434Z",
    "dateUpdated": "2024-08-30T14:51:11.346Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6531 (GCVE-0-2024-6531)

Vulnerability from cvelistv5 – Published: 2024-07-11 17:15 – Updated: 2025-08-01 17:12
VLAI?

This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-08-01T17:12:55.431Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
            }
          ],
          "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6531",
    "datePublished": "2024-07-11T17:15:57.820Z",
    "dateRejected": "2025-08-01T17:12:55.431Z",
    "dateReserved": "2024-07-05T13:56:42.257Z",
    "dateUpdated": "2025-08-01T17:12:55.431Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6485 (GCVE-0-2024-6485)

Vulnerability from cvelistv5 – Published: 2024-07-11 17:08 – Updated: 2025-11-03 19:34
VLAI?
Summary
A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button's loading state is triggered.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Bootstrap Bootstrap Affected: 1.4.0 , ≤ 3.4.1 (semver)
Create a notification for this product.
    Bootstrap-sass bootstrap-sass Affected: 2.3.2 , ≤ 3.4.3 (semver)
Create a notification for this product.
Credits
K
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "bootstrap",
            "vendor": "getbootstrap",
            "versions": [
              {
                "lessThanOrEqual": "3.4.1",
                "status": "affected",
                "version": "2.0.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6485",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-11T18:49:37.849230Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-11T20:01:02.497Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T19:34:34.709Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6485"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Bootstrap",
          "vendor": "Bootstrap",
          "versions": [
            {
              "lessThanOrEqual": "3.4.1",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "bootstrap-sass",
          "vendor": "Bootstrap-sass",
          "versions": [
            {
              "lessThanOrEqual": "3.4.3",
              "status": "affected",
              "version": "2.3.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "K"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the \u003c/span\u003e\u003ccode\u003edata-loading-text\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e attribute within the \u003c/span\u003e\u003ccode\u003ebutton\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button\u0027s loading state is triggered.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "A security vulnerability has been discovered in bootstrap that could enable Cross-Site Scripting (XSS) attacks. The vulnerability is associated with the data-loading-text attribute within the button plugin. This vulnerability can be exploited by injecting malicious JavaScript code into the attribute, which would then be executed when the button\u0027s loading state is triggered."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T19:15:39.832Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6485"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "XSS in Bootstrap button component",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6485",
    "datePublished": "2024-07-11T17:08:08.224Z",
    "dateReserved": "2024-07-03T16:54:39.173Z",
    "dateUpdated": "2025-11-03T19:34:34.709Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-6484 (GCVE-0-2024-6484)

Vulnerability from cvelistv5 – Published: 2024-07-11 17:03 – Updated: 2025-08-01 17:09
VLAI?

This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-08-01T17:09:30.604Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
            }
          ],
          "value": "This was not a security issue in Bootstrap. Bootstrap\u2019s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap\u2019s security model, and the associated CVE has been rescinded."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2024-6484",
    "datePublished": "2024-07-11T17:03:30.969Z",
    "dateRejected": "2025-08-01T17:08:00.300Z",
    "dateReserved": "2024-07-03T16:54:37.618Z",
    "dateUpdated": "2025-08-01T17:09:30.604Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}