Search for vulnerabilities
Vulnerability details: VCID-3gge-bre2-aaac
Vulnerability ID VCID-3gge-bre2-aaac
Aliases BIT-django-2024-24680
CVE-2024-24680
GHSA-xxj9-f6rv-m3x4
PYSEC-2024-28
Summary An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2024:1057
ssvc Track https://access.redhat.com/errata/RHSA-2024:1057
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24680.json
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00081 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00405 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00417 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00417 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00417 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.00696 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.01226 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.01289 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.01404 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.01404 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
epss 0.08433 https://api.first.org/data/v1/epss?cve=CVE-2024-24680
cvssv3.1 5.3 https://docs.djangoproject.com/en/5.0/releases/security
cvssv3.1 5.9 https://docs.djangoproject.com/en/5.0/releases/security
generic_textual HIGH https://docs.djangoproject.com/en/5.0/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/5.0/releases/security
cvssv3.1 7.5 https://docs.djangoproject.com/en/5.0/releases/security/
ssvc Track https://docs.djangoproject.com/en/5.0/releases/security/
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-xxj9-f6rv-m3x4
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-xxj9-f6rv-m3x4
cvssv3.1 3.7 https://github.com/django/django
cvssv3.1 5.9 https://github.com/django/django
generic_textual HIGH https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.9 https://github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
generic_textual HIGH https://github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
generic_textual MODERATE https://github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
cvssv3.1 5.9 https://github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
generic_textual HIGH https://github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
generic_textual MODERATE https://github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
cvssv3.1 5.9 https://github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
generic_textual HIGH https://github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
generic_textual MODERATE https://github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
cvssv3.1 5.9 https://github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
generic_textual HIGH https://github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
generic_textual MODERATE https://github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
cvssv3.1 5.9 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
cvssv3.1 3.7 https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 5.9 https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 7.5 https://groups.google.com/forum/#%21forum/django-announce
generic_textual HIGH https://groups.google.com/forum/#%21forum/django-announce
generic_textual MODERATE https://groups.google.com/forum/#%21forum/django-announce
ssvc Track https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
cvssv3.1 5.9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2024-24680
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2024-24680
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2024-24680
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2024-24680
cvssv3.1 5.9 https://www.djangoproject.com/weblog/2024/feb/06/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2024/feb/06/security-releases
generic_textual MODERATE https://www.djangoproject.com/weblog/2024/feb/06/security-releases
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
ssvc Track https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24680.json
https://api.first.org/data/v1/epss?cve=CVE-2024-24680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24680
https://docs.djangoproject.com/en/5.0/releases/security
https://docs.djangoproject.com/en/5.0/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
https://github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
https://github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
https://github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
https://groups.google.com/forum/#%21forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
https://www.djangoproject.com/weblog/2024/feb/06/security-releases
https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
2261856 https://bugzilla.redhat.com/show_bug.cgi?id=2261856
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
CVE-2024-24680 https://nvd.nist.gov/vuln/detail/CVE-2024-24680
GHSA-xxj9-f6rv-m3x4 https://github.com/advisories/GHSA-xxj9-f6rv-m3x4
RHSA-2024:1057 https://access.redhat.com/errata/RHSA-2024:1057
RHSA-2024:1878 https://access.redhat.com/errata/RHSA-2024:1878
RHSA-2024:2731 https://access.redhat.com/errata/RHSA-2024:2731
RHSA-2024:5662 https://access.redhat.com/errata/RHSA-2024:5662
USN-6623-1 https://usn.ubuntu.com/6623-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2024:1057
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:57:21Z/ Found at https://access.redhat.com/errata/RHSA-2024:1057
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24680.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://docs.djangoproject.com/en/5.0/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://docs.djangoproject.com/en/5.0/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://docs.djangoproject.com/en/5.0/releases/security/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:36Z/ Found at https://docs.djangoproject.com/en/5.0/releases/security/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:36Z/ Found at https://groups.google.com/forum/#%21forum/django-announce
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:36Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:36Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:36Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-24680
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-24680
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-24680
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2024/feb/06/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:36Z/ Found at https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
Exploit Prediction Scoring System (EPSS)
Percentile 0.35675
EPSS Score 0.00081
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-02-06T19:48:04.356594+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/6623-1/ 34.0.0rc2