{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T10:37:17.667","vulnerabilities":[{"cve":{"id":"CVE-2024-32484","sourceIdentifier":"talos-cna@cisco.com","published":"2024-07-22T15:15:03.417","lastModified":"2025-11-04T18:16:20.377","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An reflected XSS vulnerability exists in the handling of invalid paths in the Flask server in Ankitects Anki 24.04. A specially crafted flashcard can lead to JavaScript code execution and result in an arbitrary file read. An attacker can share a malicious flashcard to trigger this vulnerability."},{"lang":"es","value":" Existe una vulnerabilidad XSS reflejado en el manejo de rutas no válidas en el servidor Flask en Ankitects Anki 24.04. Una tarjeta flash especialmente manipulada puede provocar la ejecución de código JavaScript y dar como resultado la lectura de un archivo arbitrario. Un atacante puede compartir una tarjeta flash maliciosa para desencadenar esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.7}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-80"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ankitects:anki:24.04:*:*:*:*:*:*:*","matchCriteriaId":"A4503900-0DB5-402F-B7AD-36456CFF3DAE"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1995","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1995","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1995","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}