{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T13:34:55.032","vulnerabilities":[{"cve":{"id":"CVE-2024-46985","sourceIdentifier":"security-advisories@github.com","published":"2024-09-23T16:15:06.097","lastModified":"2024-09-27T16:35:25.473","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"DataEase is an open source data visualization analysis tool. Prior to version 2.10.1, there is an XML external entity injection vulnerability in the static resource upload interface of DataEase. An attacker can construct a payload to implement intranet detection and file reading. The vulnerability has been fixed in v2.10.1."},{"lang":"es","value":"DataEase es una herramienta de análisis de visualización de datos de código abierto. Antes de la versión 2.10.1, existía una vulnerabilidad de inyección de entidad externa XML en la interfaz de carga de recursos estáticos de DataEase. Un atacante puede construir un payload para implementar la detección de intranet y la lectura de archivos. La vulnerabilidad se ha corregido en la versión 2.10.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*","versionEndExcluding":"2.10.1","matchCriteriaId":"58CDACB3-C8F7-4428-80BC-4AAA40E067A5"}]}]}],"references":[{"url":"https://github.com/dataease/dataease/security/advisories/GHSA-4m9p-7xg6-f4mm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}