{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T14:36:21.121","vulnerabilities":[{"cve":{"id":"CVE-2024-27922","sourceIdentifier":"security-advisories@github.com","published":"2024-03-21T02:52:21.083","lastModified":"2026-01-02T14:11:17.913","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"TOMP Bare Server implements the TompHTTP bare server. A vulnerability in versions prior to 2.0.2 relates to insecure handling of HTTP requests by the @tomphttp/bare-server-node package. This flaw potentially exposes the users of the package to manipulation of their web traffic. The impact may vary depending on the specific usage of the package but it can potentially affect any system where this package is in use. The problem has been patched in version 2.0.2. As of time of publication, no specific workaround strategies have been disclosed."},{"lang":"es","value":"TOMP Bare Server implementa el servidor básico TompHTTP. Una vulnerabilidad en versiones anteriores a la 2.0.2 se relaciona con el manejo inseguro de solicitudes HTTP por parte del paquete @tomphttp/bare-server-node. Este fallo expone potencialmente a los usuarios del paquete a la manipulación de su tráfico web. El impacto puede variar según el uso específico del paquete, pero puede afectar potencialmente a cualquier sistema donde se utilice este paquete. El problema se solucionó en la versión 2.0.2. Al momento de la publicación, no se han revelado estrategias específicas de workaround."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-444"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tomphttp:tomp_bare_server:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.2","matchCriteriaId":"9080B015-3EF8-4472-B1A3-CCAFDA5E0F5C"}]}]}],"references":[{"url":"https://github.com/tomphttp/bare-server-node/security/advisories/GHSA-86fc-f9gr-v533","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/tomphttp/bare-server-node/security/advisories/GHSA-86fc-f9gr-v533","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}