{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T19:57:58.730","vulnerabilities":[{"cve":{"id":"CVE-2024-29368","sourceIdentifier":"cve@mitre.org","published":"2024-04-22T21:15:49.043","lastModified":"2025-04-30T16:45:39.453","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An arbitrary file upload vulnerability in the file handling module of moziloCMS v2.0 allows attackers to bypass extension restrictions via file renaming, potentially leading to unauthorized file execution or storage of malicious content."},{"lang":"es","value":"Un problema descubierto en moziloCMS v2.0 permite a los atacantes eludir las restricciones de carga de archivos y ejecutar código arbitrario cambiando la extensión del archivo después de la carga mediante una solicitud POST manipulada."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:*","matchCriteriaId":"90FBE733-9D6E-42A6-989D-80264913A262"}]}]}],"references":[{"url":"https://github.com/becpn/mozilocms","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/becpn/mozilocms","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}