{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:55:54.139","vulnerabilities":[{"cve":{"id":"CVE-2024-52805","sourceIdentifier":"security-advisories@github.com","published":"2024-12-03T17:15:12.120","lastModified":"2025-08-26T15:06:04.290","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while processing the request, which can be used to amplify denial of service attacks. Synapse 1.120.1 resolves the issue by denying requests with unsupported multipart/form-data content type."},{"lang":"es","value":" Synapse es un servidor doméstico Matrix de código abierto. En Synapse anterior a la versión 1.120.1, las solicitudes multipart/form-data pueden, en determinadas configuraciones, aumentar transitoriamente el consumo de memoria más allá de los niveles esperados mientras se procesa la solicitud, lo que se puede utilizar para amplificar los ataques de denegación de servicio. Synapse 1.120.1 resuelve el problema al denegar las solicitudes con un tipo de contenido multipart/form-data no compatible."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*","versionEndExcluding":"1.120.1","matchCriteriaId":"9EBEE834-2AD8-446B-8103-40C4F70A026F"}]}]}],"references":[{"url":"https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609","source":"security-advisories@github.com","tags":["Issue Tracking"]}]}}]}