{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T00:33:40.103","vulnerabilities":[{"cve":{"id":"CVE-2024-29030","sourceIdentifier":"security-advisories@github.com","published":"2024-04-19T15:15:50.430","lastModified":"2025-07-07T16:05:52.817","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file."},{"lang":"es","value":"Memos es un servicio de toma de notas liviano y que prioriza la privacidad. En memos 0.13.2, existe una vulnerabilidad SSRF en /api/resource que permite a los usuarios autenticados enumerar la red interna."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*","versionStartIncluding":"0.13.2","versionEndExcluding":"0.22.0","matchCriteriaId":"1BF6028C-D563-4A72-80B2-910AEA67A040"}]}]}],"references":[{"url":"https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}