{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:41:27.934","vulnerabilities":[{"cve":{"id":"CVE-2024-37162","sourceIdentifier":"security-advisories@github.com","published":"2024-06-07T15:15:50.617","lastModified":"2024-11-21T09:23:20.180","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`."},{"lang":"es","value":"zsa es una librería para crear acciones de servidor con seguridad tipográfica en Next.js. Todos los usuarios se ven afectados. La aplicación zsa transfiere la pila de errores de análisis desde el servidor al cliente en modo de compilación de producción. Potencialmente, esto puede revelar información confidencial sobre el entorno del servidor, como el nombre de usuario de la máquina y las rutas del directorio. Un atacante podría aprovechar esta vulnerabilidad para obtener acceso no autorizado a información confidencial del servidor. Esta información podría usarse para planificar futuros ataques u obtener una comprensión más profunda de la infraestructura del servidor. Esto ha sido parcheado en `0.3.3`."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.5,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-209"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*","versionEndExcluding":"0.3.3","matchCriteriaId":"4DDAA2C4-0E79-46B0-BE82-73B86D8B383A"}]}]}],"references":[{"url":"https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}