{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T05:32:07.480","vulnerabilities":[{"cve":{"id":"CVE-2024-42351","sourceIdentifier":"security-advisories@github.com","published":"2024-09-20T19:15:15.857","lastModified":"2025-08-15T14:17:54.360","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Galaxy is a free, open-source system for analyzing data, authoring workflows, training and education, publishing tools, managing infrastructure, and more. An attacker can potentially replace the contents of public datasets resulting in data loss or tampering. All supported branches of Galaxy (and more back to release_21.05) were amended with the below patch. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Galaxy es un sistema gratuito de código abierto para analizar datos, crear flujos de trabajo, brindar capacitación y educación, publicar herramientas, administrar infraestructura y más. Un atacante podría reemplazar el contenido de conjuntos de datos públicos, lo que provocaría la pérdida o manipulación de datos. Todas las ramas compatibles de Galaxy (y más desde la versión release_21.05) se modificaron con el siguiente parche. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:galaxyproject:galaxy:*:*:*:*:*:*:*:*","versionEndExcluding":"21.05","matchCriteriaId":"6DD26918-93B0-4BD6-903A-ADCBBED0B8FC"}]}]}],"references":[{"url":"https://depot.galaxyproject.org/patch/GX-2024-0001/022da344a02bafd604402ac8e253e0014f6e2e08.patch","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://depot.galaxyproject.org/patch/GX-2024-0001/15060a6cb222f2fcfc687d0f0260f1eb1b9c757b.patch","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://depot.galaxyproject.org/patch/GX-2024-0001/235f1d8b400708556732b9dda788c919ebf3bb80.patch","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/galaxyproject/galaxy/security/advisories/GHSA-5639-cmph-9j4v","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}