CVE-2024-25249

An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
Configurations

Configuration 1 (hide)

cpe:2.3:a:he3app:he3_app:2.0.17:*:*:*:*:macos:*:*

History

27 Mar 2025, 20:15

Type Values Removed Values Added
CWE CWE-94

12 Feb 2025, 16:44

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time He3app he3 App
He3app
CPE cpe:2.3:a:he3app:he3_app:2.0.17:*:*:*:*:macos:*:*
References () https://github.com/intbjw - () https://github.com/intbjw - Not Applicable
References () https://github.com/intbjw/CVE-2024-25249 - () https://github.com/intbjw/CVE-2024-25249 - Broken Link
References () https://www.electronjs.org/blog/statement-run-as-node-cves - () https://www.electronjs.org/blog/statement-run-as-node-cves - Technical Description
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

21 Nov 2024, 09:00

Type Values Removed Values Added
References () https://github.com/intbjw - () https://github.com/intbjw -
References () https://github.com/intbjw/CVE-2024-25249 - () https://github.com/intbjw/CVE-2024-25249 -
References () https://www.electronjs.org/blog/statement-run-as-node-cves - () https://www.electronjs.org/blog/statement-run-as-node-cves -

22 Feb 2024, 19:07

Type Values Removed Values Added
Summary
  • (es) Un problema en la aplicación He3 para macOS versión 2.0.17 permite a atacantes remotos ejecutar código arbitrario a través de la configuración RunAsNode y enableNodeClilnspectArguments.

21 Feb 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-21 20:15

Updated : 2025-03-27 20:15


NVD link : CVE-2024-25249

Mitre link : CVE-2024-25249

CVE.ORG link : CVE-2024-25249


JSON object : View

Products Affected

he3app

  • he3_app
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')