Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 18 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Feb 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sat, 15 Feb 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884). | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published: 2025-02-15T05:00:01.061Z
Updated: 2025-02-18T20:32:41.833Z
Reserved: 2025-02-14T13:41:24.175Z
Link: CVE-2025-1302
Updated: 2025-02-18T20:32:35.560Z
Status : Received
Published: 2025-02-15T05:15:11.683
Modified: 2025-02-15T05:15:11.683
Link: CVE-2025-1302