{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T00:58:16.907","vulnerabilities":[{"cve":{"id":"CVE-2024-24761","sourceIdentifier":"security-advisories@github.com","published":"2024-03-06T18:15:46.620","lastModified":"2024-12-17T20:06:11.133","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Galette is a membership management web application for non profit organizations. Starting in version 1.0.0 and prior to version 1.0.2, public pages are per default restricted to only administrators and staff members. From configuration, it is possible to restrict to up-to-date members or to everyone. Version 1.0.2 fixes this issue."},{"lang":"es","value":"Galette es una aplicación web de gestión de membresías para organizaciones sin fines de lucro. A partir de la versión 1.0.0 y antes de la versión 1.0.2, las páginas públicas están restringidas de forma predeterminada solo a administradores y miembros del personal. Desde la configuración es posible restringir a miembros actualizados o a todos. La versión 1.0.2 soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:galette:galette:1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"3F4FBC8E-27FB-425C-871C-A4B692C3C649"},{"vulnerable":true,"criteria":"cpe:2.3:a:galette:galette:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EDA7B0B9-09C4-475D-BFA2-E4969FE36527"}]}]}],"references":[{"url":"https://github.com/galette/galette/commit/a5c18bb9819b8da1b3ef58f3e79577083c657fbb","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/galette/galette/security/advisories/GHSA-jrqg-mpwv-pxpv","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/galette/galette/commit/a5c18bb9819b8da1b3ef58f3e79577083c657fbb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/galette/galette/security/advisories/GHSA-jrqg-mpwv-pxpv","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}