{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T14:00:51.174","vulnerabilities":[{"cve":{"id":"CVE-2024-6221","sourceIdentifier":"security@huntr.dev","published":"2024-08-18T19:15:04.730","lastModified":"2025-04-07T15:15:42.060","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions."},{"lang":"es","value":"Una vulnerabilidad en corydolphin/flask-cors versión 4.0.1 permite que el encabezado CORS `Access-Control-Allow-Private-Network` se establezca en verdadero de forma predeterminada, sin ninguna opción de configuración. Este comportamiento puede exponer los recursos de la red privada a un acceso externo no autorizado, lo que genera importantes riesgos de seguridad, como violaciones de datos, acceso no autorizado a información confidencial y posibles intrusiones en la red."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:corydolphin:flask-cors:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"489D084D-F1F0-4345-ACD8-44B2CF18BDCF"}]}]}],"references":[{"url":"https://github.com/corydolphin/flask-cors/commit/03aa3f8e2256437f7bad96422a747b98ab5e31bf","source":"security@huntr.dev"},{"url":"https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}