{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T13:51:59.138","vulnerabilities":[{"cve":{"id":"CVE-2024-54002","sourceIdentifier":"security-advisories@github.com","published":"2024-12-04T16:15:26.537","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Performing a login request against the /api/v1/user/login endpoint with a username that exist in the system takes significantly longer than performing the same action with a username that is not known by the system. The observable difference in request duration can be leveraged by actors to enumerate valid names of managed users. LDAP and OpenID Connect users are not affected. The issue has been fixed in Dependency-Track 4.12.2."},{"lang":"es","value":"Dependency-Track es una plataforma de análisis de componentes que permite a las organizaciones identificar y reducir los riesgos en la cadena de suministro de software. Realizar una solicitud de inicio de sesión en el punto de conexión /api/v1/user/login con un nombre de usuario que existe en el sistema lleva mucho más tiempo que realizar la misma acción con un nombre de usuario que el sistema no conoce. Los actores pueden aprovechar la diferencia observable en la duración de la solicitud para enumerar los nombres válidos de los usuarios administrados. Los usuarios de LDAP y OpenID Connect no se ven afectados. El problema se ha solucionado en Dependency-Track 4.12.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-203"}]}],"references":[{"url":"https://github.com/DependencyTrack/dependency-track/security/advisories/GHSA-9w3m-hm36-w32w","source":"security-advisories@github.com"}]}}]}