| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2024-30203
Vulnerability Database
CVE-2024-30203
Base Score
MEDIUM
5.5
CVE-2024-30203
In Emacs before 29.3, Gnus treats inline MIME contents as trusted.
Vector
LOCAL
Published By
cve@mitre.org
Published Date
Mar 25, 2024, 15:15
Weakness Type (CWE)
:
NVD-CWE-noinfo
CVSS Metrics
CVSS v3.1
Base Score
5.5
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Severity
MEDIUM
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
NONE
Integrity (I)
NONE
Availability (A)
HIGH
References
http://www.openwall.com/lists/oss-security/2024/03/25/2
http://www.openwall.com/lists/oss-security/2024/04/08/3
http://www.openwall.com/lists/oss-security/2024/04/08/4
http://www.openwall.com/lists/oss-security/2024/04/08/6
http://www.openwall.com/lists/oss-security/2024/04/08/7
http://www.openwall.com/lists/oss-security/2024/04/10/3
http://www.openwall.com/lists/oss-security/2024/04/10/4
http://www.openwall.com/lists/oss-security/2024/04/10/5
http://www.openwall.com/lists/oss-security/2024/04/10/6
http://www.openwall.com/lists/oss-security/2024/04/11/4
http://www.openwall.com/lists/oss-security/2024/04/11/5
http://www.openwall.com/lists/oss-security/2024/04/11/6
https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=937b9042ad7426acdcca33e3d931d8f495bdd804
https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29
https://lists.debian.org/debian-lts-announce/2024/04/msg00023.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00024.html
Base Score
MEDIUM
5.5
Weakness Type (CWE)
:
NVD-CWE-noinfo
CVSS Metrics
CVSS v3.1
Base Score
5.5
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Severity
MEDIUM
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
NONE
Integrity (I)
NONE
Availability (A)
HIGH