{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T08:39:23.219","vulnerabilities":[{"cve":{"id":"CVE-2024-25175","sourceIdentifier":"cve@mitre.org","published":"2024-03-25T15:15:52.123","lastModified":"2025-09-19T15:07:55.423","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An issue in Kickdler before v1.107.0 allows attackers to provide an XSS payload via a HTTP response splitting attack."},{"lang":"es","value":"Un problema en Kickdler anterior a v1.107.0 permite a los atacantes proporcionar un payload XSS a través de un ataque de división de respuesta HTTP."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kickdler:kickdler:*:*:*:*:*:*:*:*","versionEndExcluding":"1.107.0","matchCriteriaId":"99A14926-DDB0-4F54-87DB-1B3198B431BC"}]}]}],"references":[{"url":"https://github.com/jet-pentest/CVE-2024-25175","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.kickidler.com/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/jet-pentest/CVE-2024-25175","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.kickidler.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}