Search for vulnerabilities
Vulnerability details: VCID-ewxh-f1q5-kyaa
Vulnerability ID VCID-ewxh-f1q5-kyaa
Aliases BIT-django-2024-56374
CVE-2024-56374
GHSA-qcgg-j2x8-h9g8
PYSEC-2025-1
Summary django: potential denial-of-service vulnerability in IPv6 validation
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56374.json
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00074 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00074 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00074 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
epss 0.00217 https://api.first.org/data/v1/epss?cve=CVE-2024-56374
cvssv3.1 5.8 https://docs.djangoproject.com/en/dev/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/dev/releases/security
cvssv3.1 5.8 https://docs.djangoproject.com/en/dev/releases/security/
cvssv3.1 5.8 https://docs.djangoproject.com/en/dev/releases/security/
ssvc Track https://docs.djangoproject.com/en/dev/releases/security/
ssvc Track https://docs.djangoproject.com/en/dev/releases/security/
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-qcgg-j2x8-h9g8
cvssv3.1 5.8 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.8 https://github.com/django/django/commit/4806731e58f3e8700a3c802e77899d54ac6021fe
generic_textual MODERATE https://github.com/django/django/commit/4806731e58f3e8700a3c802e77899d54ac6021fe
cvssv3.1 5.8 https://github.com/django/django/commit/ad866a1ca3e7d60da888d25d27e46a8adb2ed36e
generic_textual MODERATE https://github.com/django/django/commit/ad866a1ca3e7d60da888d25d27e46a8adb2ed36e
cvssv3.1 5.8 https://github.com/django/django/commit/ca2be7724e1244a4cb723de40a070f873c6e94bf
generic_textual MODERATE https://github.com/django/django/commit/ca2be7724e1244a4cb723de40a070f873c6e94bf
cvssv3.1 5.8 https://github.com/django/django/commit/e8d4a2005955dcf962193600b53bf461b190b455
generic_textual MODERATE https://github.com/django/django/commit/e8d4a2005955dcf962193600b53bf461b190b455
cvssv3.1 5.8 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2025-1.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2025-1.yaml
cvssv3.1 5.8 https://groups.google.com/g/django-announce
generic_textual MODERATE https://groups.google.com/g/django-announce
ssvc Track https://groups.google.com/g/django-announce
cvssv3.1 5.8 https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html
cvssv3.1 5.8 https://nvd.nist.gov/vuln/detail/CVE-2024-56374
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-56374
cvssv3.1 5.8 https://www.djangoproject.com/weblog/2025/jan/14/security-releases
generic_textual MODERATE https://www.djangoproject.com/weblog/2025/jan/14/security-releases
cvssv3.1 5.8 https://www.djangoproject.com/weblog/2025/jan/14/security-releases/
ssvc Track https://www.djangoproject.com/weblog/2025/jan/14/security-releases/
cvssv3.1 5.8 http://www.openwall.com/lists/oss-security/2025/01/14/2
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2025/01/14/2
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56374.json
https://api.first.org/data/v1/epss?cve=CVE-2024-56374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56374
https://docs.djangoproject.com/en/dev/releases/security
https://docs.djangoproject.com/en/dev/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/4806731e58f3e8700a3c802e77899d54ac6021fe
https://github.com/django/django/commit/ad866a1ca3e7d60da888d25d27e46a8adb2ed36e
https://github.com/django/django/commit/ca2be7724e1244a4cb723de40a070f873c6e94bf
https://github.com/django/django/commit/e8d4a2005955dcf962193600b53bf461b190b455
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2025-1.yaml
https://groups.google.com/g/django-announce
https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56374
https://www.djangoproject.com/weblog/2025/jan/14/security-releases
https://www.djangoproject.com/weblog/2025/jan/14/security-releases/
http://www.openwall.com/lists/oss-security/2025/01/14/2
1093049 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093049
2337996 https://bugzilla.redhat.com/show_bug.cgi?id=2337996
GHSA-qcgg-j2x8-h9g8 https://github.com/advisories/GHSA-qcgg-j2x8-h9g8
RHSA-2025:0722 https://access.redhat.com/errata/RHSA-2025:0722
RHSA-2025:0777 https://access.redhat.com/errata/RHSA-2025:0777
RHSA-2025:0782 https://access.redhat.com/errata/RHSA-2025:0782
RHSA-2025:1249 https://access.redhat.com/errata/RHSA-2025:1249
RHSA-2025:2399 https://access.redhat.com/errata/RHSA-2025:2399
RHSA-2025:4576 https://access.redhat.com/errata/RHSA-2025:4576
USN-7205-1 https://usn.ubuntu.com/7205-1/
USN-7205-2 https://usn.ubuntu.com/7205-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56374.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://docs.djangoproject.com/en/dev/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://docs.djangoproject.com/en/dev/releases/security/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://docs.djangoproject.com/en/dev/releases/security/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T19:40:35Z/ Found at https://docs.djangoproject.com/en/dev/releases/security/

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T19:40:35Z/ Found at https://docs.djangoproject.com/en/dev/releases/security/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://github.com/django/django/commit/4806731e58f3e8700a3c802e77899d54ac6021fe
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://github.com/django/django/commit/ad866a1ca3e7d60da888d25d27e46a8adb2ed36e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://github.com/django/django/commit/ca2be7724e1244a4cb723de40a070f873c6e94bf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://github.com/django/django/commit/e8d4a2005955dcf962193600b53bf461b190b455
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2025-1.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://groups.google.com/g/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T19:40:35Z/ Found at https://groups.google.com/g/django-announce
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2024-56374
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://www.djangoproject.com/weblog/2025/jan/14/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at https://www.djangoproject.com/weblog/2025/jan/14/security-releases/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T19:40:35Z/ Found at https://www.djangoproject.com/weblog/2025/jan/14/security-releases/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Found at http://www.openwall.com/lists/oss-security/2025/01/14/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.1189
EPSS Score 0.00041
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-01-16T14:22:51.340473+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56374.json 35.1.0