Search for vulnerabilities
Vulnerability details: VCID-3a3r-69cy-aaac
Vulnerability ID VCID-3a3r-69cy-aaac
Aliases BIT-2020-24583
BIT-django-2020-24583
CVE-2020-24583
GHSA-m6gj-h9gm-gw44
PYSEC-2020-33
Summary An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24583.json
epss 0.00218 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00218 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.00259 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.0284 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
epss 0.11538 https://api.first.org/data/v1/epss?cve=CVE-2020-24583
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1874485
cvssv3.1 3.7 https://docs.djangoproject.com/en/dev/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/dev/releases/security
generic_textual Medium https://docs.djangoproject.com/en/dev/releases/security/
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-m6gj-h9gm-gw44
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9
generic_textual HIGH https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-33.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-33.yaml
cvssv3.1 7.5 https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM
generic_textual HIGH https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM
cvssv3.1 7.5 https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU
generic_textual HIGH https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2020-24583
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-24583
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-24583
archlinux Medium https://security.archlinux.org/AVG-1217
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20200918-0004
generic_textual HIGH https://security.netapp.com/advisory/ntap-20200918-0004
cvssv3.1 7.5 https://usn.ubuntu.com/4479-1
generic_textual HIGH https://usn.ubuntu.com/4479-1
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2020/sep/01/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2020/sep/01/security-releases
cvssv3.1 7.5 https://www.openwall.com/lists/oss-security/2020/09/01/2
generic_textual HIGH https://www.openwall.com/lists/oss-security/2020/09/01/2
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2021.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2021.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24583.json
https://api.first.org/data/v1/epss?cve=CVE-2020-24583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24583
https://docs.djangoproject.com/en/dev/releases/security
https://docs.djangoproject.com/en/dev/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-33.yaml
https://groups.google.com/forum/#%21topic/django-announce/Gdqn58RqIDM
https://groups.google.com/forum/#%21topic/django-announce/zFCMdgUnutU
https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM
https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
https://security.netapp.com/advisory/ntap-20200918-0004
https://security.netapp.com/advisory/ntap-20200918-0004/
https://usn.ubuntu.com/4479-1
https://usn.ubuntu.com/4479-1/
https://www.djangoproject.com/weblog/2020/sep/01/security-releases
https://www.djangoproject.com/weblog/2020/sep/01/security-releases/
https://www.openwall.com/lists/oss-security/2020/09/01/2
https://www.oracle.com/security-alerts/cpujan2021.html
1874485 https://bugzilla.redhat.com/show_bug.cgi?id=1874485
969367 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969367
ASA-202009-4 https://security.archlinux.org/ASA-202009-4
AVG-1217 https://security.archlinux.org/AVG-1217
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVE-2020-24583 https://nvd.nist.gov/vuln/detail/CVE-2020-24583
GHSA-m6gj-h9gm-gw44 https://github.com/advisories/GHSA-m6gj-h9gm-gw44
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24583.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://docs.djangoproject.com/en/dev/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-33.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-24583
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-24583
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-24583
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20200918-0004
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://usn.ubuntu.com/4479-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.djangoproject.com/weblog/2020/sep/01/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.openwall.com/lists/oss-security/2020/09/01/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.59522
EPSS Score 0.00218
Published At Dec. 27, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.