{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T07:41:15.624","vulnerabilities":[{"cve":{"id":"CVE-2025-29471","sourceIdentifier":"cve@mitre.org","published":"2025-04-15T22:15:25.997","lastModified":"2025-04-23T16:30:10.987","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Cross Site Scripting vulnerability in Nagios Log Server v.2024R1.3.1 allows a remote attacker to execute arbitrary code via a payload into the Email field."},{"lang":"es","value":"La vulnerabilidad de Cross-Site Scripting en Nagios Log Server v.2024R1.3.1 permite a un atacante remoto ejecutar código arbitrario a través de un payload en el campo de correo electrónico."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":6.0}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nagios:log_server:2024:r1.3.1:*:*:*:*:*:*","matchCriteriaId":"7CEC223A-A3EE-4C51-8B71-E19C73B9215C"}]}]}],"references":[{"url":"https://www.exploit-db.com/exploits/52117","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.nagios.com/changelog/#log-server","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://youtu.be/MvJuIkdTSQg","source":"cve@mitre.org","tags":["Exploit"]}]}}]}