{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T17:41:20.929","vulnerabilities":[{"cve":{"id":"CVE-2024-32869","sourceIdentifier":"security-advisories@github.com","published":"2024-04-23T21:15:48.623","lastModified":"2025-09-17T20:34:12.597","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue."},{"lang":"es","value":"Hono es un framework de aplicación web que brinda soporte para cualquier tiempo de ejecución de JavaScript. Antes de la versión 4.2.7, cuando se usabaserveStatic con deno, era posible recorrer el directorio donde se encontraba `main.ts`. Esto puede resultar en la recuperación de archivos inesperados. La versión 4.2.7 contiene un parche para el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*","versionEndExcluding":"4.2.7","matchCriteriaId":"C484AFF0-719D-4690-B302-85AD350050A9"}]}]}],"references":[{"url":"https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}