Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://directus.io/ |
|
| https://fluidattacks.com/advisories/bocelli |
|
Mon, 19 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 19 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monospace
Monospace directus |
|
| CPEs | cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Monospace
Monospace directus |
Fri, 16 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Directus
Directus directus |
|
| CPEs | cpe:2.3:a:directus:directus:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Directus
Directus directus |
|
| Metrics |
ssvc
|
Thu, 15 Aug 2024 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover. | |
| Title | Directus 10.13.0 - DOM-Based cross-site scripting (XSS) via layout_options | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published: 2024-08-15T03:04:08.250Z
Updated: 2025-05-19T17:56:31.826Z
Reserved: 2024-07-05T14:42:08.072Z
Link: CVE-2024-6533
Updated: 2024-08-16T17:31:46.952Z
Status : Modified
Published: 2024-08-15T03:15:04.567
Modified: 2025-05-19T18:15:26.833
Link: CVE-2024-6533
No data.