Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No reference.
Thu, 10 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Thu, 10 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Simple-spellchecker
Simple-spellchecker simple-spellchecker |
|
| Metrics |
ssvc
|
Thu, 10 Oct 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the _readFileSync function of Simple Spellchecker v1.0.2 allows attackers to read arbitrary files via a directory traversal. NOTE: this is disputed by multiple parties because the existence of _readFile and _readFileSync does not mean that Simple Spellchecker is intended for use with untrusted file_path values. | DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
| References |
|
Thu, 10 Oct 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the _readFileSync function of Simple-Spellchecker v1.0.2 allows attackers to read arbitrary files via a directory traversal. | An issue in the _readFileSync function of Simple Spellchecker v1.0.2 allows attackers to read arbitrary files via a directory traversal. NOTE: this is disputed by multiple parties because the existence of _readFile and _readFileSync does not mean that Simple Spellchecker is intended for use with untrusted file_path values. |
| References |
|
Tue, 08 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simple-spellchecker simple-spellchecker
|
|
| CPEs | cpe:2.3:a:simple-spellchecker:simple-spellchecker:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Simple-spellchecker Readfilesync Function
|
Simple-spellchecker simple-spellchecker
|
Mon, 07 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 01 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simple-spellchecker
Simple-spellchecker Readfilesync Function |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:simple-spellchecker:_readfilesync_function:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Simple-spellchecker
Simple-spellchecker Readfilesync Function |
|
| Metrics |
cvssV3_1
|
Mon, 30 Sep 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the _readFileSync function of Simple-Spellchecker v1.0.2 allows attackers to read arbitrary files via a directory traversal. | |
| References |
|
Status: REJECTED
Assigner: mitre
Published:
Updated: 2024-10-10T13:42:07.709Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-46503
Updated:
Status : Rejected
Published: 2024-09-30T21:15:03.590
Modified: 2024-10-10T14:15:05.183
Link: CVE-2024-46503
No data.
OpenCVE Enrichment
No data.
No weakness.