Vulnerability from csaf_ncscnl
Published
2024-07-12 11:43
Modified
2024-07-12 11:43
Summary
Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved

Notes

The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden gevonden en verholpen in Juniper Junos OS en Junos OS Evolved.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende in staat aanvallen uit te voeren die kunnen leiden tot Denial-of-Service (DoS), toegang tot gevoelige informatie, uitvoeren van code met verhoogde gebruikersrechten en omzeilen van een beveiligingsmaatregel.
Oplossingen
Juniper heeft updates uitgebracht om de kwetsbaarheden te verhelpen in JunOS en JunOS Evolved. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-121
Stack-based Buffer Overflow
CWE-122
Heap-based Buffer Overflow
CWE-20
Improper Input Validation
CWE-252
Unchecked Return Value
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-400
Uncontrolled Resource Consumption
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-404
Improper Resource Shutdown or Release
CWE-416
Use After Free
CWE-447
Unimplemented or Unsupported Feature in UI
CWE-532
Insertion of Sensitive Information into Log File
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-755
Improper Handling of Exceptional Conditions



{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Er zijn kwetsbaarheden gevonden en verholpen in Juniper Junos OS en Junos OS Evolved.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een kwaadwillende in staat aanvallen uit te voeren die kunnen leiden tot Denial-of-Service (DoS), toegang tot gevoelige informatie, uitvoeren van code met verhoogde gebruikersrechten en omzeilen van een beveiligingsmaatregel.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Juniper heeft updates uitgebracht om de kwetsbaarheden te verhelpen in JunOS en JunOS Evolved. Zie de referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Unchecked Return Value",
        "title": "CWE-252"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Unimplemented or Unsupported Feature in UI",
        "title": "CWE-447"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information into Log File",
        "title": "CWE-532"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Improper Handling of Exceptional Conditions",
        "title": "CWE-755"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39511"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39514"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39517"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39518"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39554"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39555"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39556"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39558"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39560"
      },
      {
        "category": "external",
        "summary": "Source - first",
        "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39561"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39511"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39514"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39517"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39518"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39528"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39530"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39532"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39533"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39536"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39539"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39540"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39541"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39542"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39543"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39545"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39549"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39550"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39551"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39552"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39554"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39555"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39556"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39558"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39560"
      },
      {
        "category": "external",
        "summary": "Source - nvd",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39561"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39511"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39514"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39517"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39518"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39528"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39530"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39532"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39533"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39536"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39539"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39540"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39541"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39542"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39543"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39545"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39549"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39550"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39551"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39552"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39554"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39555"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39556"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39558"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39560"
      },
      {
        "category": "external",
        "summary": "Source - cveprojectv5",
        "url": "https://www.cve.org/CVERecord?id=CVE-2024-39561"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA75726"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA79175"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82976"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82980"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82982"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82987"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82989"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82992"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82993"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82996"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA82999"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83000"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83001"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83002"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83004"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83007"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83011"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83012"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83013"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83014"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83015"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83016"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83018"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83020"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://supportportal.juniper.net/JSA83021"
      },
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd",
        "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved",
    "tracking": {
      "current_release_date": "2024-07-12T11:43:27.625950Z",
      "id": "NCSC-2024-0290",
      "initial_release_date": "2024-07-12T11:43:27.625950Z",
      "revision_history": [
        {
          "date": "2024-07-12T11:43:27.625950Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468459",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1499583",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:21.1-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468740",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:21.2-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468741",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:21.3-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468460",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:21.4-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468737",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:21.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468742",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.1-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468461",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.2-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1491757",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468462",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.3-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1491758",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468463",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.4-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1491759",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:22.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468464",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:23.2-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1491760",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:23.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1468465",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:23.4-evo:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1500292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:23.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1500294",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os_evolved:24.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468728",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1495028",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:20.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468729",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468730",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1500289",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.2r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1499585",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.2r3-s5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1500290",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.2r3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468731",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468732",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1500291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.4r2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1499586",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.4r3-s4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1494853",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:21.4r3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468733",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1500295",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.1r3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468734",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1494854",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.2r2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1499587",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.2r3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468735",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1494855",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.3r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1499588",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.3r2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1468739",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1494857",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:22.4r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1500297",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:23.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1482979",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:23.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1499589",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:23.2r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1499584",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:23.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-1500293",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:juniper_networks:junos_os:24.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-1499958",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:juniper_networks:junos_os_evolved:*:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "juniper_networks"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "junos_os_evolved",
            "product": {
              "name": "junos_os_evolved",
              "product_id": "CSAFPID-190806",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos_os_evolved:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-190799",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500038",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:20.4r3-s10:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809978",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809979",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809980",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-907487",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.2r3-s5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809981",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.2r3-s6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499956",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.2r3-s7:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809982",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809983",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.3r3-s4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809984",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.4r3-s4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-909039",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.4r3-s5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499957",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:21.4r3-s6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-909041",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.1r3-s1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809987",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.1r3-s3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-909052",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.1r3-s4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500040",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.1r3-s5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500751",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.2r2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500753",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.2r3-s0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-907489",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.2r3-s1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809989",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.2r3-s2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499951",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.2r3-s3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500754",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.3r2-s1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-909042",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.3r2-s2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-907497",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.3r2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-907490",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.3r3-s0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-809991",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.3r3-s1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499952",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.3r3-s2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500755",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.4r1-s2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500752",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.4r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-907492",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.4r2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1500039",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.4r3-s0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499953",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:22.4r3-s1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-907494",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:23.2r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499954",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:23.4r1-s1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos",
            "product": {
              "name": "junos",
              "product_id": "CSAFPID-1499955",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:juniper:junos:23.4r1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "junos_os",
            "product": {
              "name": "junos_os",
              "product_id": "CSAFPID-176507",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-39560",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1468459",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464",
          "CSAFPID-1500289"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39560",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39560.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1468459",
            "CSAFPID-1468742",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464",
            "CSAFPID-1500289"
          ]
        }
      ],
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584"
          ]
        }
      ],
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39511",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468730",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39511",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39511.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468730",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979"
          ]
        }
      ],
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39514",
      "cwe": {
        "id": "CWE-703",
        "name": "Improper Check or Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1468459",
          "CSAFPID-1468460",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39514",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39514.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1468459",
            "CSAFPID-1468460",
            "CSAFPID-1468742",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464"
          ]
        }
      ],
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584",
          "CSAFPID-1468459",
          "CSAFPID-1468460",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464",
          "CSAFPID-1468465"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39517",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39517.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584",
            "CSAFPID-1468459",
            "CSAFPID-1468460",
            "CSAFPID-1468742",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464",
            "CSAFPID-1468465"
          ]
        }
      ],
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1499585",
          "CSAFPID-1499586",
          "CSAFPID-1499587",
          "CSAFPID-1499588",
          "CSAFPID-1494857",
          "CSAFPID-1499589"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39518",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39518.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1499585",
            "CSAFPID-1499586",
            "CSAFPID-1499587",
            "CSAFPID-1499588",
            "CSAFPID-1494857",
            "CSAFPID-1499589"
          ]
        }
      ],
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39528",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1468459",
          "CSAFPID-1468460",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39528",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39528.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1468459",
            "CSAFPID-1468460",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464"
          ]
        }
      ],
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39530",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1494853",
          "CSAFPID-1500295",
          "CSAFPID-1494854",
          "CSAFPID-1494855",
          "CSAFPID-1494857"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39530",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39530.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1494853",
            "CSAFPID-1500295",
            "CSAFPID-1494854",
            "CSAFPID-1494855",
            "CSAFPID-1494857"
          ]
        }
      ],
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39532",
      "cwe": {
        "id": "CWE-532",
        "name": "Insertion of Sensitive Information into Log File"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information into Log File",
          "title": "CWE-532"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1500295",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468459",
          "CSAFPID-1468461",
          "CSAFPID-1468462"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39532",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39532.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1500295",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468459",
            "CSAFPID-1468461",
            "CSAFPID-1468462"
          ]
        }
      ],
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "cwe": {
        "id": "CWE-447",
        "name": "Unimplemented or Unsupported Feature in UI"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unimplemented or Unsupported Feature in UI",
          "title": "CWE-447"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39533",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39533.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979"
          ]
        }
      ],
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39536",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1500297",
          "CSAFPID-1468740",
          "CSAFPID-1468460",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39536",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39536.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1500297",
            "CSAFPID-1468740",
            "CSAFPID-1468460",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464"
          ]
        }
      ],
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39539",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39539",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39539.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979"
          ]
        }
      ],
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1499585"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39540",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39540.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1499585"
          ]
        }
      ],
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584",
          "CSAFPID-1468463",
          "CSAFPID-1468464",
          "CSAFPID-1468465"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39541",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39541.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584",
            "CSAFPID-1468463",
            "CSAFPID-1468464",
            "CSAFPID-1468465"
          ]
        }
      ],
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468734",
          "CSAFPID-1468459",
          "CSAFPID-1468737"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39542",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39542.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468734",
            "CSAFPID-1468459",
            "CSAFPID-1468737"
          ]
        }
      ],
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584",
          "CSAFPID-1468459",
          "CSAFPID-1468737",
          "CSAFPID-1491757",
          "CSAFPID-1491758",
          "CSAFPID-1491759",
          "CSAFPID-1491760",
          "CSAFPID-1500292"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39543",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39543.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584",
            "CSAFPID-1468459",
            "CSAFPID-1468737",
            "CSAFPID-1491757",
            "CSAFPID-1491758",
            "CSAFPID-1491759",
            "CSAFPID-1491760",
            "CSAFPID-1500292"
          ]
        }
      ],
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39545",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39545.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739"
          ]
        }
      ],
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39549",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468732",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584",
          "CSAFPID-1500293",
          "CSAFPID-1468459",
          "CSAFPID-1468737",
          "CSAFPID-1491757",
          "CSAFPID-1491758",
          "CSAFPID-1491759",
          "CSAFPID-1491760",
          "CSAFPID-1500292",
          "CSAFPID-1500294"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39549",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39549.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468732",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584",
            "CSAFPID-1500293",
            "CSAFPID-1468459",
            "CSAFPID-1468737",
            "CSAFPID-1491757",
            "CSAFPID-1491758",
            "CSAFPID-1491759",
            "CSAFPID-1491760",
            "CSAFPID-1500292",
            "CSAFPID-1500294"
          ]
        }
      ],
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1500290",
          "CSAFPID-1500291",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39550",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39550.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1500290",
            "CSAFPID-1500291",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584"
          ]
        }
      ],
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1495028",
          "CSAFPID-1468730",
          "CSAFPID-1468731",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39551",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39551.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1495028",
            "CSAFPID-1468730",
            "CSAFPID-1468731",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979"
          ]
        }
      ],
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39552",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468730",
          "CSAFPID-1468731",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1468459",
          "CSAFPID-1468741",
          "CSAFPID-1468460",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464",
          "CSAFPID-1468465"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39552",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39552.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468730",
            "CSAFPID-1468731",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1468459",
            "CSAFPID-1468741",
            "CSAFPID-1468460",
            "CSAFPID-1468742",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464",
            "CSAFPID-1468465"
          ]
        }
      ],
      "title": "CVE-2024-39552"
    },
    {
      "cve": "CVE-2024-39554",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468729",
          "CSAFPID-1468730",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499583",
          "CSAFPID-1468740",
          "CSAFPID-1468460",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468729",
            "CSAFPID-1468730",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499583",
            "CSAFPID-1468740",
            "CSAFPID-1468460",
            "CSAFPID-1468742",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464"
          ]
        }
      ],
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584",
          "CSAFPID-1468459",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464",
          "CSAFPID-1468465"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39555",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39555.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1482979",
            "CSAFPID-1499584",
            "CSAFPID-1468459",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463",
            "CSAFPID-1468464",
            "CSAFPID-1468465"
          ]
        }
      ],
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1482979",
          "CSAFPID-1499584",
          "CSAFPID-1468459",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463",
          "CSAFPID-1468464",
          "CSAFPID-1468465"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39556",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39556.json"
        }
      ],
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39558",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Return Value",
          "title": "CWE-252"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1468728",
          "CSAFPID-1468730",
          "CSAFPID-1468732",
          "CSAFPID-1468733",
          "CSAFPID-1468734",
          "CSAFPID-1468735",
          "CSAFPID-1468739",
          "CSAFPID-1468459",
          "CSAFPID-1468740",
          "CSAFPID-1468460",
          "CSAFPID-1468742",
          "CSAFPID-1468461",
          "CSAFPID-1468462",
          "CSAFPID-1468463"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39558",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39558.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1468728",
            "CSAFPID-1468730",
            "CSAFPID-1468732",
            "CSAFPID-1468733",
            "CSAFPID-1468734",
            "CSAFPID-1468735",
            "CSAFPID-1468739",
            "CSAFPID-1468459",
            "CSAFPID-1468740",
            "CSAFPID-1468460",
            "CSAFPID-1468742",
            "CSAFPID-1468461",
            "CSAFPID-1468462",
            "CSAFPID-1468463"
          ]
        }
      ],
      "title": "CVE-2024-39558"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.