Vulnerability from csaf_ncscnl
Published
2024-12-10 19:32
Modified
2025-01-06 07:30
Summary
Kwetsbaarheden verholpen in Microsoft Windows

Notes

The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
UPDATE: Onderzoekers hebben proof of concept (PoC) code gepubliceerd, waarmee de kwetsbaarheid met kenmerk CVE-2024-49113 kan worden aangetoond. Succesvol misbruik vereist dat de kwaadwillende toegang heeft tot zowel een DC met LDAP en een malafide server onder eigen controle. Hierdoor is misbruik niet eenvoudig te realiseren, maar neemt de kans erop wel toe. Succesvol misbruik resulteert in een Denial-of-Service van het kwetsbare systeem. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service (DoS) - Uitvoer van willekeurige code (Gebruikersrechten) - Uitvoer van willekeurige code (Systeemrechten) - Verkrijgen van verhoogde rechten - Toegang tot gevoelige gegevens De ernstigste kwetsbaarheid heeft kenmerk CVE-2024-49112 toegewezen gekregen en bevindt zich in de LDAP-component van de Domain Controller. Een kwaadwillende kan de kwetsbaarheid misbruiken om zonder voorafgaande authenticatie uitvoer van willekeurige code mogelijk te maken middels een malafide LDAP-call. Succesvol misbruik vereist wel dat de kwaadwillende LAN-toegang tot de Domain Controller heeft. ``` Windows Kernel-Mode Drivers: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49074 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Remote Desktop Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49105 | 8.40 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Mobile Broadband: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49073 | 6.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49087 | 4.60 | Toegang tot gevoelige gegevens | | CVE-2024-49092 | 6.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49077 | 6.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49078 | 6.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49083 | 6.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49110 | 6.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows PrintWorkflowUserSvc: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49097 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2024-49095 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Kernel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49084 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49132 | 8.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Routing and Remote Access Service (RRAS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49085 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-49086 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-49089 | 7.20 | Uitvoeren van willekeurige code | | CVE-2024-49102 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-49104 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-49125 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Role: DNS Server: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49091 | 7.20 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Role: Windows Hyper-V: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49117 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows LDAP - Lightweight Directory Access Protocol: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49121 | 7.50 | Denial-of-Service | | CVE-2024-49124 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49112 | 9.80 | Uitvoeren van willekeurige code | | CVE-2024-49113 | 7.50 | Denial-of-Service | | CVE-2024-49127 | 8.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office Publisher: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49079 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows IP Routing Management Snapin: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49080 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Resilient File System (ReFS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49093 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Task Scheduler: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49072 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49106 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49108 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49115 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49119 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49120 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49123 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49129 | 7.50 | Denial-of-Service | | CVE-2024-49075 | 7.50 | Denial-of-Service | | CVE-2024-49116 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49128 | 8.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Wireless Wide Area Network Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49094 | 6.60 | Verkrijgen van verhoogde rechten | | CVE-2024-49098 | 4.30 | Toegang tot gevoelige gegevens | | CVE-2024-49099 | 4.30 | Toegang tot gevoelige gegevens | | CVE-2024-49101 | 6.60 | Verkrijgen van verhoogde rechten | | CVE-2024-49103 | 4.30 | Toegang tot gevoelige gegevens | | CVE-2024-49111 | 6.60 | Verkrijgen van verhoogde rechten | | CVE-2024-49081 | 6.60 | Verkrijgen van verhoogde rechten | | CVE-2024-49109 | 6.60 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| WmsRepair Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49107 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Local Security Authority Subsystem Service (LSASS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49126 | 8.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Message Queuing: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49096 | 7.50 | Denial-of-Service | | CVE-2024-49122 | 8.10 | Uitvoeren van willekeurige code | | CVE-2024-49118 | 8.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Common Log File System Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49088 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49090 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2024-49138 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Cloud Files Mini Filter Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49114 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Virtualization-Based Security (VBS) Enclave: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49076 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows File Explorer: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-49082 | 6.80 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| System Center Operations Manager: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43594 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op: https://portal.msrc.microsoft.com/en-us/security-guidance
Kans
medium
Schade
high
CWE-591
Sensitive Data Storage in Improperly Locked Memory
CWE-393
Return of Wrong Status Code
CWE-453
Insecure Default Variable Initialization
CWE-820
Missing Synchronization
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-822
Untrusted Pointer Dereference
CWE-126
Buffer Over-read
CWE-415
Double Free
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-190
Integer Overflow or Wraparound
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-284
Improper Access Control
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-400
Uncontrolled Resource Consumption
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-122
Heap-based Buffer Overflow
CWE-681
Incorrect Conversion between Numeric Types
CWE-20
Improper Input Validation
CWE-287
Improper Authentication



{
   document: {
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         tlp: {
            label: "WHITE",
         },
      },
      lang: "nl",
      notes: [
         {
            category: "legal_disclaimer",
            text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.",
         },
         {
            category: "description",
            text: "Microsoft heeft kwetsbaarheden verholpen in Windows.",
            title: "Feiten",
         },
         {
            category: "description",
            text: "UPDATE: \nOnderzoekers hebben proof of concept (PoC) code gepubliceerd, waarmee de kwetsbaarheid met kenmerk CVE-2024-49113 kan worden aangetoond. Succesvol misbruik vereist dat de kwaadwillende toegang heeft tot zowel een DC met LDAP en een malafide server onder eigen controle. Hierdoor is misbruik niet eenvoudig te realiseren, maar neemt de kans erop wel toe. Succesvol misbruik resulteert in een Denial-of-Service van het kwetsbare systeem.\n\n\nEen kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:\n\n- Denial-of-Service (DoS)\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Systeemrechten)\n- Verkrijgen van verhoogde rechten\n- Toegang tot gevoelige gegevens\n\nDe ernstigste kwetsbaarheid heeft kenmerk CVE-2024-49112 toegewezen gekregen en bevindt zich in de LDAP-component van de Domain Controller. Een kwaadwillende kan de kwetsbaarheid misbruiken om zonder voorafgaande authenticatie uitvoer van willekeurige code mogelijk te maken middels een malafide LDAP-call. Succesvol misbruik vereist wel dat de kwaadwillende LAN-toegang tot de Domain Controller heeft.\n\n```\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49074 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49105 | 8.40 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Mobile Broadband: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49073 | 6.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49087 | 4.60 | Toegang tot gevoelige gegevens      | \n| CVE-2024-49092 | 6.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49077 | 6.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49078 | 6.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49083 | 6.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49110 | 6.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows PrintWorkflowUserSvc: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49097 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49095 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49084 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49132 | 8.10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49085 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2024-49086 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2024-49089 | 7.20 | Uitvoeren van willekeurige code     | \n| CVE-2024-49102 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2024-49104 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2024-49125 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nRole: DNS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49091 | 7.20 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49117 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows LDAP - Lightweight Directory Access Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49121 | 7.50 | Denial-of-Service                   | \n| CVE-2024-49124 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49112 | 9.80 | Uitvoeren van willekeurige code     | \n| CVE-2024-49113 | 7.50 | Denial-of-Service                   | \n| CVE-2024-49127 | 8.10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Publisher: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49079 | 7.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows IP Routing Management Snapin: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49080 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49093 | 8.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Task Scheduler: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49072 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49106 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49108 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49115 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49119 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49120 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49123 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49129 | 7.50 | Denial-of-Service                   | \n| CVE-2024-49075 | 7.50 | Denial-of-Service                   | \n| CVE-2024-49116 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49128 | 8.10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Wireless Wide Area Network Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49094 | 6.60 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49098 | 4.30 | Toegang tot gevoelige gegevens      | \n| CVE-2024-49099 | 4.30 | Toegang tot gevoelige gegevens      | \n| CVE-2024-49101 | 6.60 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49103 | 4.30 | Toegang tot gevoelige gegevens      | \n| CVE-2024-49111 | 6.60 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49081 | 6.60 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49109 | 6.60 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWmsRepair Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49107 | 7.30 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority Subsystem Service (LSASS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49126 | 8.10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49096 | 7.50 | Denial-of-Service                   | \n| CVE-2024-49122 | 8.10 | Uitvoeren van willekeurige code     | \n| CVE-2024-49118 | 8.10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49088 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49090 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2024-49138 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Cloud Files Mini Filter Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49114 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Virtualization-Based Security (VBS) Enclave: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49076 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows File Explorer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-49082 | 6.80 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nSystem Center Operations Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2024-43594 | 7.30 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n```",
            title: "Interpretaties",
         },
         {
            category: "description",
            text: "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
            title: "Oplossingen",
         },
         {
            category: "general",
            text: "medium",
            title: "Kans",
         },
         {
            category: "general",
            text: "high",
            title: "Schade",
         },
         {
            category: "general",
            text: "Sensitive Data Storage in Improperly Locked Memory",
            title: "CWE-591",
         },
         {
            category: "general",
            text: "Return of Wrong Status Code",
            title: "CWE-393",
         },
         {
            category: "general",
            text: "Insecure Default Variable Initialization",
            title: "CWE-453",
         },
         {
            category: "general",
            text: "Missing Synchronization",
            title: "CWE-820",
         },
         {
            category: "general",
            text: "Improper Link Resolution Before File Access ('Link Following')",
            title: "CWE-59",
         },
         {
            category: "general",
            text: "Integer Underflow (Wrap or Wraparound)",
            title: "CWE-191",
         },
         {
            category: "general",
            text: "Untrusted Pointer Dereference",
            title: "CWE-822",
         },
         {
            category: "general",
            text: "Buffer Over-read",
            title: "CWE-126",
         },
         {
            category: "general",
            text: "Double Free",
            title: "CWE-415",
         },
         {
            category: "general",
            text: "Access of Resource Using Incompatible Type ('Type Confusion')",
            title: "CWE-843",
         },
         {
            category: "general",
            text: "Integer Overflow or Wraparound",
            title: "CWE-190",
         },
         {
            category: "general",
            text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
            title: "CWE-362",
         },
         {
            category: "general",
            text: "Out-of-bounds Read",
            title: "CWE-125",
         },
         {
            category: "general",
            text: "Improper Access Control",
            title: "CWE-284",
         },
         {
            category: "general",
            text: "Use After Free",
            title: "CWE-416",
         },
         {
            category: "general",
            text: "NULL Pointer Dereference",
            title: "CWE-476",
         },
         {
            category: "general",
            text: "Uncontrolled Resource Consumption",
            title: "CWE-400",
         },
         {
            category: "general",
            text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
            title: "CWE-22",
         },
         {
            category: "general",
            text: "Heap-based Buffer Overflow",
            title: "CWE-122",
         },
         {
            category: "general",
            text: "Incorrect Conversion between Numeric Types",
            title: "CWE-681",
         },
         {
            category: "general",
            text: "Improper Input Validation",
            title: "CWE-20",
         },
         {
            category: "general",
            text: "Improper Authentication",
            title: "CWE-287",
         },
      ],
      publisher: {
         category: "coordinator",
         contact_details: "cert@ncsc.nl",
         name: "Nationaal Cyber Security Centrum",
         namespace: "https://www.ncsc.nl/",
      },
      title: "Kwetsbaarheden verholpen in Microsoft Windows",
      tracking: {
         current_release_date: "2025-01-06T07:30:29.655717Z",
         id: "NCSC-2024-0470",
         initial_release_date: "2024-12-10T19:32:38.846024Z",
         revision_history: [
            {
               date: "2024-12-10T19:32:38.846024Z",
               number: "0",
               summary: "Initiele versie",
            },
            {
               date: "2025-01-06T07:30:29.655717Z",
               number: "1",
               summary: "Onderzoekers hebben proof of concept (PoC) code gepubliceerd, waarmee de kwetsbaarheid met kenmerk CVE-2024-49113 kan worden aangetoond.",
            },
         ],
         status: "final",
         version: "1.0.1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  category: "product_name",
                  name: "windows_11_22h2",
                  product: {
                     name: "windows_11_22h2",
                     product_id: "CSAFPID-1741412",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.4602:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_23h2",
                  product: {
                     name: "windows_11_23h2",
                     product_id: "CSAFPID-1741417",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.4602:*:*:*:*:*:arm64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_23h2",
                  product: {
                     name: "windows_11_23h2",
                     product_id: "CSAFPID-1741418",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.4602:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_24h2",
                  product: {
                     name: "windows_11_24h2",
                     product_id: "CSAFPID-1741420",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2605:*:*:*:*:*:arm64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_24h2",
                  product: {
                     name: "windows_11_24h2",
                     product_id: "CSAFPID-1741421",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2605:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_r2",
                  product: {
                     name: "windows_server_2008_r2",
                     product_id: "CSAFPID-1741430",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.27467:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_sp2",
                  product: {
                     name: "windows_server_2008_sp2",
                     product_id: "CSAFPID-1741428",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23016:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_sp2",
                  product: {
                     name: "windows_server_2008_sp2",
                     product_id: "CSAFPID-1741429",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23016:*:*:*:*:*:x86:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2012",
                  product: {
                     name: "windows_server_2012",
                     product_id: "CSAFPID-1741431",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25222:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2012_r2",
                  product: {
                     name: "windows_server_2012_r2",
                     product_id: "CSAFPID-1741432",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.22318:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2016",
                  product: {
                     name: "windows_server_2016",
                     product_id: "CSAFPID-1741427",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7606:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2019",
                  product: {
                     name: "windows_server_2019",
                     product_id: "CSAFPID-1741407",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.6659:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2022",
                  product: {
                     name: "windows_server_2022",
                     product_id: "CSAFPID-1741422",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2966:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2025",
                  product: {
                     name: "windows_server_2025",
                     product_id: "CSAFPID-1741416",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.2528:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_23h2",
                  product: {
                     name: "windows_server_23h2",
                     product_id: "CSAFPID-1741419",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1308:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "system_center_operations_manager",
                  product: {
                     name: "system_center_operations_manager",
                     product_id: "CSAFPID-618487",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "system_center_operations_manager",
                  product: {
                     name: "system_center_operations_manager",
                     product_id: "CSAFPID-634172",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "system_center_operations_manager",
                  product: {
                     name: "system_center_operations_manager",
                     product_id: "CSAFPID-1741404",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:system_center_operations_manager:2025:-:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "system_center_operations_manager__scom__2019",
                  product: {
                     name: "system_center_operations_manager__scom__2019",
                     product_id: "CSAFPID-1718165",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:system_center_operations_manager__scom__2019:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "system_center_operations_manager__scom__2022",
                  product: {
                     name: "system_center_operations_manager__scom__2022",
                     product_id: "CSAFPID-1718167",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:system_center_operations_manager__scom__2022:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "system_center_operations_manager__scom__2025",
                  product: {
                     name: "system_center_operations_manager__scom__2025",
                     product_id: "CSAFPID-1741485",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:system_center_operations_manager__scom__2025:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows",
                  product: {
                     name: "windows",
                     product_id: "CSAFPID-549001",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_version_1507",
                  product: {
                     name: "windows_10_version_1507",
                     product_id: "CSAFPID-1723936",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_10_version_1507:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_version_1607",
                  product: {
                     name: "windows_10_version_1607",
                     product_id: "CSAFPID-1723937",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_10_version_1607:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_version_1809",
                  product: {
                     name: "windows_10_version_1809",
                     product_id: "CSAFPID-1720442",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_10_version_1809:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_version_21h2",
                  product: {
                     name: "windows_10_version_21h2",
                     product_id: "CSAFPID-1741366",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_10_version_21h2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_version_22h2",
                  product: {
                     name: "windows_10_version_22h2",
                     product_id: "CSAFPID-1741368",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_10_version_22h2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_version_22h2",
                  product: {
                     name: "windows_11_version_22h2",
                     product_id: "CSAFPID-1741367",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_11_version_22h2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_version_22h3",
                  product: {
                     name: "windows_11_version_22h3",
                     product_id: "CSAFPID-1741369",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_11_version_22h3:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_version_23h2",
                  product: {
                     name: "windows_11_version_23h2",
                     product_id: "CSAFPID-1741370",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_11_version_23h2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_version_24h2",
                  product: {
                     name: "windows_11_version_24h2",
                     product_id: "CSAFPID-1741371",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_11_version_24h2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008__service_pack_2",
                  product: {
                     name: "windows_server_2008__service_pack_2",
                     product_id: "CSAFPID-1723943",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2008__service_pack_2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_r2_service_pack_1",
                  product: {
                     name: "windows_server_2008_r2_service_pack_1",
                     product_id: "CSAFPID-1723944",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_r2_service_pack_1__server_core_installation_",
                  product: {
                     name: "windows_server_2008_r2_service_pack_1__server_core_installation_",
                     product_id: "CSAFPID-1723945",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_service_pack_2",
                  product: {
                     name: "windows_server_2008_service_pack_2",
                     product_id: "CSAFPID-1723941",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2008_service_pack_2__server_core_installation_",
                  product: {
                     name: "windows_server_2008_service_pack_2__server_core_installation_",
                     product_id: "CSAFPID-1723942",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2012",
                  product: {
                     name: "windows_server_2012",
                     product_id: "CSAFPID-1717820",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2012__server_core_installation_",
                  product: {
                     name: "windows_server_2012__server_core_installation_",
                     product_id: "CSAFPID-1717821",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2012__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2012_r2",
                  product: {
                     name: "windows_server_2012_r2",
                     product_id: "CSAFPID-1717822",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2012_r2__server_core_installation_",
                  product: {
                     name: "windows_server_2012_r2__server_core_installation_",
                     product_id: "CSAFPID-1717823",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2012_r2__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2016",
                  product: {
                     name: "windows_server_2016",
                     product_id: "CSAFPID-1717812",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2016__server_core_installation_",
                  product: {
                     name: "windows_server_2016__server_core_installation_",
                     product_id: "CSAFPID-1717813",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2016__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2019",
                  product: {
                     name: "windows_server_2019",
                     product_id: "CSAFPID-1717808",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2019__server_core_installation_",
                  product: {
                     name: "windows_server_2019__server_core_installation_",
                     product_id: "CSAFPID-1717809",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2019__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2022",
                  product: {
                     name: "windows_server_2022",
                     product_id: "CSAFPID-1717810",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2022__23h2_edition__server_core_installation_",
                  product: {
                     name: "windows_server_2022__23h2_edition__server_core_installation_",
                     product_id: "CSAFPID-1741352",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2022__23h2_edition__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2025",
                  product: {
                     name: "windows_server_2025",
                     product_id: "CSAFPID-1741353",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_server_2025__server_core_installation_",
                  product: {
                     name: "windows_server_2025__server_core_installation_",
                     product_id: "CSAFPID-1741354",
                     product_identification_helper: {
                        cpe: "cpe:2.3:a:microsoft:windows_server_2025__server_core_installation_:*:*:*:*:*:*:*:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_1507",
                  product: {
                     name: "windows_10_1507",
                     product_id: "CSAFPID-1741424",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20857:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_1507",
                  product: {
                     name: "windows_10_1507",
                     product_id: "CSAFPID-1741423",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20857:*:*:*:*:*:x86:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_1607",
                  product: {
                     name: "windows_10_1607",
                     product_id: "CSAFPID-1741426",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7606:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_1607",
                  product: {
                     name: "windows_10_1607",
                     product_id: "CSAFPID-1741425",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7606:*:*:*:*:*:x86:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_1809",
                  product: {
                     name: "windows_10_1809",
                     product_id: "CSAFPID-1741406",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.6659:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_1809",
                  product: {
                     name: "windows_10_1809",
                     product_id: "CSAFPID-1741405",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.6659:*:*:*:*:*:x86:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_21h2",
                  product: {
                     name: "windows_10_21h2",
                     product_id: "CSAFPID-1741409",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.5247:*:*:*:*:*:arm64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_21h2",
                  product: {
                     name: "windows_10_21h2",
                     product_id: "CSAFPID-1741410",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.5247:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_21h2",
                  product: {
                     name: "windows_10_21h2",
                     product_id: "CSAFPID-1741408",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.5247:*:*:*:*:*:x86:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_22h2",
                  product: {
                     name: "windows_10_22h2",
                     product_id: "CSAFPID-1741414",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5247:*:*:*:*:*:arm64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_22h2",
                  product: {
                     name: "windows_10_22h2",
                     product_id: "CSAFPID-1741413",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5247:*:*:*:*:*:x64:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_10_22h2",
                  product: {
                     name: "windows_10_22h2",
                     product_id: "CSAFPID-1741415",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.5247:*:*:*:*:*:x86:*",
                     },
                  },
               },
               {
                  category: "product_name",
                  name: "windows_11_22h2",
                  product: {
                     name: "windows_11_22h2",
                     product_id: "CSAFPID-1741411",
                     product_identification_helper: {
                        cpe: "cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.4602:*:*:*:*:*:arm64:*",
                     },
                  },
               },
            ],
            category: "vendor",
            name: "microsoft",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2024-49123",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49123",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49123.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49123",
      },
      {
         cve: "CVE-2024-49124",
         cwe: {
            id: "CWE-362",
            name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
         },
         notes: [
            {
               category: "other",
               text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
               title: "CWE-362",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49124",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49124.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49124",
      },
      {
         cve: "CVE-2024-49126",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49126",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49126.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49126",
      },
      {
         cve: "CVE-2024-49132",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49132",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49132.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49132",
      },
      {
         cve: "CVE-2024-49072",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741419",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741422",
               "CSAFPID-1741428",
               "CSAFPID-1741415",
               "CSAFPID-1741420",
               "CSAFPID-1741424",
               "CSAFPID-1741427",
               "CSAFPID-1741413",
               "CSAFPID-1741405",
               "CSAFPID-1741407",
               "CSAFPID-1741414",
               "CSAFPID-1741421",
               "CSAFPID-1741430",
               "CSAFPID-1741432",
               "CSAFPID-1741423",
               "CSAFPID-1741416",
               "CSAFPID-1741410",
               "CSAFPID-1741406",
               "CSAFPID-1741426",
               "CSAFPID-1741418",
               "CSAFPID-1741412",
               "CSAFPID-1741429",
               "CSAFPID-1741431",
               "CSAFPID-1741417",
               "CSAFPID-1741425",
               "CSAFPID-1741411",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49072",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49072.json",
            },
         ],
         title: "CVE-2024-49072",
      },
      {
         cve: "CVE-2024-49075",
         cwe: {
            id: "CWE-400",
            name: "Uncontrolled Resource Consumption",
         },
         notes: [
            {
               category: "other",
               text: "Uncontrolled Resource Consumption",
               title: "CWE-400",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741411",
               "CSAFPID-1741416",
               "CSAFPID-1741410",
               "CSAFPID-1741418",
               "CSAFPID-1741417",
               "CSAFPID-1741406",
               "CSAFPID-1741409",
               "CSAFPID-1741419",
               "CSAFPID-1741407",
               "CSAFPID-1741405",
               "CSAFPID-1741414",
               "CSAFPID-1741420",
               "CSAFPID-1741415",
               "CSAFPID-1741421",
               "CSAFPID-1741408",
               "CSAFPID-1741413",
               "CSAFPID-1741412",
               "CSAFPID-1741422",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49075",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49075.json",
            },
         ],
         title: "CVE-2024-49075",
      },
      {
         cve: "CVE-2024-49076",
         cwe: {
            id: "CWE-287",
            name: "Improper Authentication",
         },
         notes: [
            {
               category: "other",
               text: "Improper Authentication",
               title: "CWE-287",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741418",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741417",
               "CSAFPID-1741420",
               "CSAFPID-1741405",
               "CSAFPID-1741415",
               "CSAFPID-1741419",
               "CSAFPID-1741413",
               "CSAFPID-1741416",
               "CSAFPID-1741421",
               "CSAFPID-1741410",
               "CSAFPID-1741409",
               "CSAFPID-1741408",
               "CSAFPID-1741411",
               "CSAFPID-1741414",
               "CSAFPID-1741412",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49076",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49076.json",
            },
         ],
         title: "CVE-2024-49076",
      },
      {
         cve: "CVE-2024-49077",
         cwe: {
            id: "CWE-191",
            name: "Integer Underflow (Wrap or Wraparound)",
         },
         notes: [
            {
               category: "other",
               text: "Integer Underflow (Wrap or Wraparound)",
               title: "CWE-191",
            },
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1741411",
               "CSAFPID-1741417",
               "CSAFPID-1741405",
               "CSAFPID-1741407",
               "CSAFPID-1741421",
               "CSAFPID-1741416",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741414",
               "CSAFPID-1741406",
               "CSAFPID-1741415",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741408",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49077",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49077.json",
            },
         ],
         title: "CVE-2024-49077",
      },
      {
         cve: "CVE-2024-49078",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         notes: [
            {
               category: "other",
               text: "Integer Overflow or Wraparound",
               title: "CWE-190",
            },
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1741412",
               "CSAFPID-1741408",
               "CSAFPID-1741416",
               "CSAFPID-1741418",
               "CSAFPID-1741417",
               "CSAFPID-1741414",
               "CSAFPID-1741405",
               "CSAFPID-1741411",
               "CSAFPID-1741421",
               "CSAFPID-1741419",
               "CSAFPID-1741413",
               "CSAFPID-1741406",
               "CSAFPID-1741410",
               "CSAFPID-1741407",
               "CSAFPID-1741409",
               "CSAFPID-1741420",
               "CSAFPID-1741415",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49078",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49078.json",
            },
         ],
         title: "CVE-2024-49078",
      },
      {
         cve: "CVE-2024-49079",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741418",
               "CSAFPID-1741411",
               "CSAFPID-1741409",
               "CSAFPID-1741423",
               "CSAFPID-1741412",
               "CSAFPID-1741424",
               "CSAFPID-1741422",
               "CSAFPID-1741425",
               "CSAFPID-1741406",
               "CSAFPID-1741427",
               "CSAFPID-1741426",
               "CSAFPID-1741410",
               "CSAFPID-1741405",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741408",
               "CSAFPID-1741419",
               "CSAFPID-1741407",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741421",
               "CSAFPID-1741420",
               "CSAFPID-1741432",
               "CSAFPID-1741431",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49079",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49079.json",
            },
         ],
         title: "CVE-2024-49079",
      },
      {
         cve: "CVE-2024-49080",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741416",
               "CSAFPID-1741430",
               "CSAFPID-1741409",
               "CSAFPID-1741426",
               "CSAFPID-1741417",
               "CSAFPID-1741431",
               "CSAFPID-1741424",
               "CSAFPID-1741407",
               "CSAFPID-1741413",
               "CSAFPID-1741406",
               "CSAFPID-1741427",
               "CSAFPID-1741412",
               "CSAFPID-1741420",
               "CSAFPID-1741415",
               "CSAFPID-1741425",
               "CSAFPID-1741414",
               "CSAFPID-1741428",
               "CSAFPID-1741419",
               "CSAFPID-1741411",
               "CSAFPID-1741422",
               "CSAFPID-1741418",
               "CSAFPID-1741405",
               "CSAFPID-1741421",
               "CSAFPID-1741432",
               "CSAFPID-1741429",
               "CSAFPID-1741410",
               "CSAFPID-1741408",
               "CSAFPID-1741423",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49080",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49080.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
                  "CSAFPID-1741416",
                  "CSAFPID-1741430",
                  "CSAFPID-1741409",
                  "CSAFPID-1741426",
                  "CSAFPID-1741417",
                  "CSAFPID-1741431",
                  "CSAFPID-1741424",
                  "CSAFPID-1741407",
                  "CSAFPID-1741413",
                  "CSAFPID-1741406",
                  "CSAFPID-1741427",
                  "CSAFPID-1741412",
                  "CSAFPID-1741420",
                  "CSAFPID-1741415",
                  "CSAFPID-1741425",
                  "CSAFPID-1741414",
                  "CSAFPID-1741428",
                  "CSAFPID-1741419",
                  "CSAFPID-1741411",
                  "CSAFPID-1741422",
                  "CSAFPID-1741418",
                  "CSAFPID-1741405",
                  "CSAFPID-1741421",
                  "CSAFPID-1741432",
                  "CSAFPID-1741429",
                  "CSAFPID-1741410",
                  "CSAFPID-1741408",
                  "CSAFPID-1741423",
               ],
            },
         ],
         title: "CVE-2024-49080",
      },
      {
         cve: "CVE-2024-49081",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1741408",
               "CSAFPID-1741415",
               "CSAFPID-1741409",
               "CSAFPID-1741411",
               "CSAFPID-1741418",
               "CSAFPID-1741417",
               "CSAFPID-1741406",
               "CSAFPID-1741419",
               "CSAFPID-1741416",
               "CSAFPID-1741410",
               "CSAFPID-1741407",
               "CSAFPID-1741420",
               "CSAFPID-1741414",
               "CSAFPID-1741405",
               "CSAFPID-1741412",
               "CSAFPID-1741421",
               "CSAFPID-1741413",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49081",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49081.json",
            },
         ],
         title: "CVE-2024-49081",
      },
      {
         cve: "CVE-2024-49082",
         cwe: {
            id: "CWE-22",
            name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
         },
         notes: [
            {
               category: "other",
               text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
               title: "CWE-22",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741419",
               "CSAFPID-1741411",
               "CSAFPID-1741420",
               "CSAFPID-1741407",
               "CSAFPID-1741417",
               "CSAFPID-1741430",
               "CSAFPID-1741415",
               "CSAFPID-1741422",
               "CSAFPID-1741406",
               "CSAFPID-1741416",
               "CSAFPID-1741423",
               "CSAFPID-1741414",
               "CSAFPID-1741429",
               "CSAFPID-1741410",
               "CSAFPID-1741427",
               "CSAFPID-1741424",
               "CSAFPID-1741421",
               "CSAFPID-1741431",
               "CSAFPID-1741412",
               "CSAFPID-1741426",
               "CSAFPID-1741413",
               "CSAFPID-1741432",
               "CSAFPID-1741418",
               "CSAFPID-1741405",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741425",
               "CSAFPID-1741428",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49082",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49082.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
                  "CSAFPID-1741419",
                  "CSAFPID-1741411",
                  "CSAFPID-1741420",
                  "CSAFPID-1741407",
                  "CSAFPID-1741417",
                  "CSAFPID-1741430",
                  "CSAFPID-1741415",
                  "CSAFPID-1741422",
                  "CSAFPID-1741406",
                  "CSAFPID-1741416",
                  "CSAFPID-1741423",
                  "CSAFPID-1741414",
                  "CSAFPID-1741429",
                  "CSAFPID-1741410",
                  "CSAFPID-1741427",
                  "CSAFPID-1741424",
                  "CSAFPID-1741421",
                  "CSAFPID-1741431",
                  "CSAFPID-1741412",
                  "CSAFPID-1741426",
                  "CSAFPID-1741413",
                  "CSAFPID-1741432",
                  "CSAFPID-1741418",
                  "CSAFPID-1741405",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741425",
                  "CSAFPID-1741428",
               ],
            },
         ],
         title: "CVE-2024-49082",
      },
      {
         cve: "CVE-2024-49083",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1741421",
               "CSAFPID-1741414",
               "CSAFPID-1741419",
               "CSAFPID-1741416",
               "CSAFPID-1741405",
               "CSAFPID-1741417",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741420",
               "CSAFPID-1741411",
               "CSAFPID-1741413",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741415",
               "CSAFPID-1741412",
               "CSAFPID-1741418",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49083",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49083.json",
            },
         ],
         title: "CVE-2024-49083",
      },
      {
         cve: "CVE-2024-49088",
         cwe: {
            id: "CWE-126",
            name: "Buffer Over-read",
         },
         notes: [
            {
               category: "other",
               text: "Buffer Over-read",
               title: "CWE-126",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741414",
               "CSAFPID-1741430",
               "CSAFPID-1741412",
               "CSAFPID-1741417",
               "CSAFPID-1741432",
               "CSAFPID-1741406",
               "CSAFPID-1741413",
               "CSAFPID-1741423",
               "CSAFPID-1741428",
               "CSAFPID-1741422",
               "CSAFPID-1741415",
               "CSAFPID-1741407",
               "CSAFPID-1741426",
               "CSAFPID-1741424",
               "CSAFPID-1741427",
               "CSAFPID-1741405",
               "CSAFPID-1741411",
               "CSAFPID-1741420",
               "CSAFPID-1741429",
               "CSAFPID-1741431",
               "CSAFPID-1741418",
               "CSAFPID-1741425",
               "CSAFPID-1741419",
               "CSAFPID-1741410",
               "CSAFPID-1741416",
               "CSAFPID-1741408",
               "CSAFPID-1741421",
               "CSAFPID-1741409",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741353",
               "CSAFPID-1741354",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49088",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49088.json",
            },
         ],
         title: "CVE-2024-49088",
      },
      {
         cve: "CVE-2024-49090",
         cwe: {
            id: "CWE-822",
            name: "Untrusted Pointer Dereference",
         },
         notes: [
            {
               category: "other",
               text: "Untrusted Pointer Dereference",
               title: "CWE-822",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741428",
               "CSAFPID-1741418",
               "CSAFPID-1741424",
               "CSAFPID-1741411",
               "CSAFPID-1741427",
               "CSAFPID-1741416",
               "CSAFPID-1741421",
               "CSAFPID-1741409",
               "CSAFPID-1741413",
               "CSAFPID-1741408",
               "CSAFPID-1741406",
               "CSAFPID-1741423",
               "CSAFPID-1741430",
               "CSAFPID-1741417",
               "CSAFPID-1741407",
               "CSAFPID-1741429",
               "CSAFPID-1741412",
               "CSAFPID-1741425",
               "CSAFPID-1741405",
               "CSAFPID-1741422",
               "CSAFPID-1741415",
               "CSAFPID-1741432",
               "CSAFPID-1741419",
               "CSAFPID-1741426",
               "CSAFPID-1741414",
               "CSAFPID-1741410",
               "CSAFPID-1741420",
               "CSAFPID-1741431",
               "CSAFPID-1741353",
               "CSAFPID-1741354",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49090",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49090.json",
            },
         ],
         title: "CVE-2024-49090",
      },
      {
         cve: "CVE-2024-49095",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Double Free",
               title: "CWE-415",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741413",
               "CSAFPID-1741407",
               "CSAFPID-1741418",
               "CSAFPID-1741412",
               "CSAFPID-1741409",
               "CSAFPID-1741415",
               "CSAFPID-1741406",
               "CSAFPID-1741411",
               "CSAFPID-1741410",
               "CSAFPID-1741422",
               "CSAFPID-1741405",
               "CSAFPID-1741414",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741408",
               "CSAFPID-1741421",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49095",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49095.json",
            },
         ],
         title: "CVE-2024-49095",
      },
      {
         cve: "CVE-2024-49109",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741406",
               "CSAFPID-1741411",
               "CSAFPID-1741415",
               "CSAFPID-1741420",
               "CSAFPID-1741408",
               "CSAFPID-1741412",
               "CSAFPID-1741409",
               "CSAFPID-1741413",
               "CSAFPID-1741416",
               "CSAFPID-1741414",
               "CSAFPID-1741421",
               "CSAFPID-1741417",
               "CSAFPID-1741407",
               "CSAFPID-1741410",
               "CSAFPID-1741405",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49109",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49109.json",
            },
         ],
         title: "CVE-2024-49109",
      },
      {
         cve: "CVE-2024-49110",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1741419",
               "CSAFPID-1741416",
               "CSAFPID-1741410",
               "CSAFPID-1741415",
               "CSAFPID-1741406",
               "CSAFPID-1741412",
               "CSAFPID-1741417",
               "CSAFPID-1741411",
               "CSAFPID-1741408",
               "CSAFPID-1741407",
               "CSAFPID-1741405",
               "CSAFPID-1741421",
               "CSAFPID-1741409",
               "CSAFPID-1741414",
               "CSAFPID-1741413",
               "CSAFPID-1741418",
               "CSAFPID-1741420",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49110",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49110.json",
            },
         ],
         title: "CVE-2024-49110",
      },
      {
         cve: "CVE-2024-49112",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         notes: [
            {
               category: "other",
               text: "Integer Overflow or Wraparound",
               title: "CWE-190",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741431",
               "CSAFPID-1741406",
               "CSAFPID-1741432",
               "CSAFPID-1741408",
               "CSAFPID-1741422",
               "CSAFPID-1741423",
               "CSAFPID-1741412",
               "CSAFPID-1741427",
               "CSAFPID-1741418",
               "CSAFPID-1741407",
               "CSAFPID-1741405",
               "CSAFPID-1741429",
               "CSAFPID-1741409",
               "CSAFPID-1741428",
               "CSAFPID-1741410",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741426",
               "CSAFPID-1741424",
               "CSAFPID-1741415",
               "CSAFPID-1741421",
               "CSAFPID-1741411",
               "CSAFPID-1741430",
               "CSAFPID-1741420",
               "CSAFPID-1741413",
               "CSAFPID-1741419",
               "CSAFPID-1741414",
               "CSAFPID-1741425",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49112",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49112.json",
            },
         ],
         title: "CVE-2024-49112",
      },
      {
         cve: "CVE-2024-49113",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741423",
               "CSAFPID-1741426",
               "CSAFPID-1741416",
               "CSAFPID-1741409",
               "CSAFPID-1741418",
               "CSAFPID-1741427",
               "CSAFPID-1741432",
               "CSAFPID-1741414",
               "CSAFPID-1741420",
               "CSAFPID-1741411",
               "CSAFPID-1741410",
               "CSAFPID-1741405",
               "CSAFPID-1741415",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741425",
               "CSAFPID-1741412",
               "CSAFPID-1741422",
               "CSAFPID-1741424",
               "CSAFPID-1741406",
               "CSAFPID-1741430",
               "CSAFPID-1741413",
               "CSAFPID-1741407",
               "CSAFPID-1741417",
               "CSAFPID-1741419",
               "CSAFPID-1741431",
               "CSAFPID-1741408",
               "CSAFPID-1741421",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49113",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49113.json",
            },
         ],
         title: "CVE-2024-49113",
      },
      {
         cve: "CVE-2024-49114",
         cwe: {
            id: "CWE-820",
            name: "Missing Synchronization",
         },
         notes: [
            {
               category: "other",
               text: "Missing Synchronization",
               title: "CWE-820",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1741354",
               "CSAFPID-1741421",
               "CSAFPID-1741416",
               "CSAFPID-1741408",
               "CSAFPID-1741419",
               "CSAFPID-1741409",
               "CSAFPID-1741412",
               "CSAFPID-1741407",
               "CSAFPID-1741415",
               "CSAFPID-1741406",
               "CSAFPID-1741418",
               "CSAFPID-1741417",
               "CSAFPID-1741422",
               "CSAFPID-1741420",
               "CSAFPID-1741414",
               "CSAFPID-1741413",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741405",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49114",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49114.json",
            },
         ],
         title: "CVE-2024-49114",
      },
      {
         cve: "CVE-2024-49118",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741429",
               "CSAFPID-1741426",
               "CSAFPID-1741405",
               "CSAFPID-1741418",
               "CSAFPID-1741421",
               "CSAFPID-1741432",
               "CSAFPID-1741427",
               "CSAFPID-1741416",
               "CSAFPID-1741406",
               "CSAFPID-1741409",
               "CSAFPID-1741420",
               "CSAFPID-1741424",
               "CSAFPID-1741415",
               "CSAFPID-1741412",
               "CSAFPID-1741422",
               "CSAFPID-1741431",
               "CSAFPID-1741430",
               "CSAFPID-1741414",
               "CSAFPID-1741411",
               "CSAFPID-1741408",
               "CSAFPID-1741417",
               "CSAFPID-1741413",
               "CSAFPID-1741423",
               "CSAFPID-1741407",
               "CSAFPID-1741410",
               "CSAFPID-1741428",
               "CSAFPID-1741425",
               "CSAFPID-1741419",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49118",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49118.json",
            },
         ],
         title: "CVE-2024-49118",
      },
      {
         cve: "CVE-2024-49127",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741420",
               "CSAFPID-1741408",
               "CSAFPID-1741426",
               "CSAFPID-1741416",
               "CSAFPID-1741410",
               "CSAFPID-1741430",
               "CSAFPID-1741406",
               "CSAFPID-1741423",
               "CSAFPID-1741432",
               "CSAFPID-1741418",
               "CSAFPID-1741405",
               "CSAFPID-1741407",
               "CSAFPID-1741429",
               "CSAFPID-1741415",
               "CSAFPID-1741431",
               "CSAFPID-1741427",
               "CSAFPID-1741424",
               "CSAFPID-1741421",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741417",
               "CSAFPID-1741419",
               "CSAFPID-1741414",
               "CSAFPID-1741428",
               "CSAFPID-1741425",
               "CSAFPID-1741413",
               "CSAFPID-1741409",
               "CSAFPID-1741422",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49127",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49127.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741420",
                  "CSAFPID-1741408",
                  "CSAFPID-1741426",
                  "CSAFPID-1741416",
                  "CSAFPID-1741410",
                  "CSAFPID-1741430",
                  "CSAFPID-1741406",
                  "CSAFPID-1741423",
                  "CSAFPID-1741432",
                  "CSAFPID-1741418",
                  "CSAFPID-1741405",
                  "CSAFPID-1741407",
                  "CSAFPID-1741429",
                  "CSAFPID-1741415",
                  "CSAFPID-1741431",
                  "CSAFPID-1741427",
                  "CSAFPID-1741424",
                  "CSAFPID-1741421",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741417",
                  "CSAFPID-1741419",
                  "CSAFPID-1741414",
                  "CSAFPID-1741428",
                  "CSAFPID-1741425",
                  "CSAFPID-1741413",
                  "CSAFPID-1741409",
                  "CSAFPID-1741422",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49127",
      },
      {
         cve: "CVE-2024-49138",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-549001",
               "CSAFPID-1741424",
               "CSAFPID-1741422",
               "CSAFPID-1741414",
               "CSAFPID-1741431",
               "CSAFPID-1741412",
               "CSAFPID-1741432",
               "CSAFPID-1741425",
               "CSAFPID-1741417",
               "CSAFPID-1741423",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741413",
               "CSAFPID-1741411",
               "CSAFPID-1741405",
               "CSAFPID-1741427",
               "CSAFPID-1741416",
               "CSAFPID-1741418",
               "CSAFPID-1741407",
               "CSAFPID-1741429",
               "CSAFPID-1741420",
               "CSAFPID-1741406",
               "CSAFPID-1741421",
               "CSAFPID-1741419",
               "CSAFPID-1741415",
               "CSAFPID-1741426",
               "CSAFPID-1741430",
               "CSAFPID-1741408",
               "CSAFPID-1741428",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49138",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49138.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
                  "CSAFPID-549001",
                  "CSAFPID-1741424",
                  "CSAFPID-1741422",
                  "CSAFPID-1741414",
                  "CSAFPID-1741431",
                  "CSAFPID-1741412",
                  "CSAFPID-1741432",
                  "CSAFPID-1741425",
                  "CSAFPID-1741417",
                  "CSAFPID-1741423",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741413",
                  "CSAFPID-1741411",
                  "CSAFPID-1741405",
                  "CSAFPID-1741427",
                  "CSAFPID-1741416",
                  "CSAFPID-1741418",
                  "CSAFPID-1741407",
                  "CSAFPID-1741429",
                  "CSAFPID-1741420",
                  "CSAFPID-1741406",
                  "CSAFPID-1741421",
                  "CSAFPID-1741419",
                  "CSAFPID-1741415",
                  "CSAFPID-1741426",
                  "CSAFPID-1741430",
                  "CSAFPID-1741408",
                  "CSAFPID-1741428",
               ],
            },
         ],
         title: "CVE-2024-49138",
      },
      {
         cve: "CVE-2024-49085",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         notes: [
            {
               category: "other",
               text: "Integer Overflow or Wraparound",
               title: "CWE-190",
            },
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49085",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49085.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49085",
      },
      {
         cve: "CVE-2024-49086",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49086",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49086.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49086",
      },
      {
         cve: "CVE-2024-49091",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49091",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49091.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49091",
      },
      {
         cve: "CVE-2024-49106",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49106",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49106.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
               ],
            },
         ],
         title: "CVE-2024-49106",
      },
      {
         cve: "CVE-2024-49108",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49108",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49108.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
               ],
            },
         ],
         title: "CVE-2024-49108",
      },
      {
         cve: "CVE-2024-49115",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49115",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49115.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
               ],
            },
         ],
         title: "CVE-2024-49115",
      },
      {
         cve: "CVE-2024-49119",
         cwe: {
            id: "CWE-843",
            name: "Access of Resource Using Incompatible Type ('Type Confusion')",
         },
         notes: [
            {
               category: "other",
               text: "Access of Resource Using Incompatible Type ('Type Confusion')",
               title: "CWE-843",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49119",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49119.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
               ],
            },
         ],
         title: "CVE-2024-49119",
      },
      {
         cve: "CVE-2024-49120",
         cwe: {
            id: "CWE-453",
            name: "Insecure Default Variable Initialization",
         },
         notes: [
            {
               category: "other",
               text: "Insecure Default Variable Initialization",
               title: "CWE-453",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49120",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49120.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49120",
      },
      {
         cve: "CVE-2024-49125",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49125",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49125.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49125",
      },
      {
         cve: "CVE-2024-49129",
         cwe: {
            id: "CWE-400",
            name: "Uncontrolled Resource Consumption",
         },
         notes: [
            {
               category: "other",
               text: "Uncontrolled Resource Consumption",
               title: "CWE-400",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741416",
               "CSAFPID-1741419",
               "CSAFPID-1741427",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49129",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49129.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741416",
                  "CSAFPID-1741419",
                  "CSAFPID-1741427",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49129",
      },
      {
         cve: "CVE-2024-49116",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1741407",
               "CSAFPID-1741416",
               "CSAFPID-1741427",
               "CSAFPID-1741422",
               "CSAFPID-1741419",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49116",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49116.json",
            },
         ],
         title: "CVE-2024-49116",
      },
      {
         cve: "CVE-2024-49128",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741432",
               "CSAFPID-1741416",
               "CSAFPID-1741407",
               "CSAFPID-1741427",
               "CSAFPID-1741431",
               "CSAFPID-1741419",
               "CSAFPID-1741422",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741354",
               "CSAFPID-1741352",
               "CSAFPID-1741353",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49128",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49128.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741432",
                  "CSAFPID-1741416",
                  "CSAFPID-1741407",
                  "CSAFPID-1741427",
                  "CSAFPID-1741431",
                  "CSAFPID-1741419",
                  "CSAFPID-1741422",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741354",
                  "CSAFPID-1741352",
                  "CSAFPID-1741353",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49128",
      },
      {
         cve: "CVE-2024-49117",
         cwe: {
            id: "CWE-393",
            name: "Return of Wrong Status Code",
         },
         notes: [
            {
               category: "other",
               text: "Return of Wrong Status Code",
               title: "CWE-393",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741422",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1717810",
               "CSAFPID-1741367",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49117",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49117.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741422",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1717810",
                  "CSAFPID-1741367",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49117",
      },
      {
         cve: "CVE-2024-49093",
         cwe: {
            id: "CWE-681",
            name: "Incorrect Conversion between Numeric Types",
         },
         notes: [
            {
               category: "other",
               text: "Incorrect Conversion between Numeric Types",
               title: "CWE-681",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741416",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741353",
               "CSAFPID-1741354",
               "CSAFPID-1741371",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49093",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49093.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741416",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741353",
                  "CSAFPID-1741354",
                  "CSAFPID-1741371",
               ],
            },
         ],
         title: "CVE-2024-49093",
      },
      {
         cve: "CVE-2024-43594",
         cwe: {
            id: "CWE-284",
            name: "Improper Access Control",
         },
         notes: [
            {
               category: "other",
               text: "Improper Access Control",
               title: "CWE-284",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-618487",
               "CSAFPID-634172",
               "CSAFPID-1741404",
               "CSAFPID-1718165",
               "CSAFPID-1718167",
               "CSAFPID-1741485",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-43594",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43594.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-618487",
                  "CSAFPID-634172",
                  "CSAFPID-1741404",
                  "CSAFPID-1718165",
                  "CSAFPID-1718167",
                  "CSAFPID-1741485",
               ],
            },
         ],
         title: "CVE-2024-43594",
      },
      {
         cve: "CVE-2024-49073",
         cwe: {
            id: "CWE-20",
            name: "Improper Input Validation",
         },
         notes: [
            {
               category: "other",
               text: "Improper Input Validation",
               title: "CWE-20",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49073",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49073.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49073",
      },
      {
         cve: "CVE-2024-49074",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741368",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49074",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49074.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741368",
               ],
            },
         ],
         title: "CVE-2024-49074",
      },
      {
         cve: "CVE-2024-49084",
         cwe: {
            id: "CWE-362",
            name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
         },
         notes: [
            {
               category: "other",
               text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
               title: "CWE-362",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49084",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49084.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49084",
      },
      {
         cve: "CVE-2024-49087",
         cwe: {
            id: "CWE-20",
            name: "Improper Input Validation",
         },
         notes: [
            {
               category: "other",
               text: "Improper Input Validation",
               title: "CWE-20",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49087",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49087.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49087",
      },
      {
         cve: "CVE-2024-49089",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         notes: [
            {
               category: "other",
               text: "Integer Overflow or Wraparound",
               title: "CWE-190",
            },
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49089",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49089.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49089",
      },
      {
         cve: "CVE-2024-49092",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49092",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49092.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49092",
      },
      {
         cve: "CVE-2024-49094",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49094",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49094.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49094",
      },
      {
         cve: "CVE-2024-49096",
         cwe: {
            id: "CWE-400",
            name: "Uncontrolled Resource Consumption",
         },
         notes: [
            {
               category: "other",
               text: "Uncontrolled Resource Consumption",
               title: "CWE-400",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49096",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49096.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49096",
      },
      {
         cve: "CVE-2024-49097",
         cwe: {
            id: "CWE-591",
            name: "Sensitive Data Storage in Improperly Locked Memory",
         },
         notes: [
            {
               category: "other",
               text: "Sensitive Data Storage in Improperly Locked Memory",
               title: "CWE-591",
            },
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49097",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49097.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49097",
      },
      {
         cve: "CVE-2024-49098",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49098",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49098.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49098",
      },
      {
         cve: "CVE-2024-49099",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49099",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49099.json",
            },
         ],
         title: "CVE-2024-49099",
      },
      {
         cve: "CVE-2024-49101",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49101",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49101.json",
            },
         ],
         title: "CVE-2024-49101",
      },
      {
         cve: "CVE-2024-49102",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49102",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49102.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49102",
      },
      {
         cve: "CVE-2024-49103",
         cwe: {
            id: "CWE-191",
            name: "Integer Underflow (Wrap or Wraparound)",
         },
         notes: [
            {
               category: "other",
               text: "Integer Underflow (Wrap or Wraparound)",
               title: "CWE-191",
            },
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49103",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49103.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49103",
      },
      {
         cve: "CVE-2024-49104",
         cwe: {
            id: "CWE-122",
            name: "Heap-based Buffer Overflow",
         },
         notes: [
            {
               category: "other",
               text: "Heap-based Buffer Overflow",
               title: "CWE-122",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49104",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49104.json",
            },
         ],
         title: "CVE-2024-49104",
      },
      {
         cve: "CVE-2024-49105",
         cwe: {
            id: "CWE-284",
            name: "Improper Access Control",
         },
         notes: [
            {
               category: "other",
               text: "Improper Access Control",
               title: "CWE-284",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
               "CSAFPID-1741419",
               "CSAFPID-1741423",
               "CSAFPID-1741408",
               "CSAFPID-1741411",
               "CSAFPID-1741430",
               "CSAFPID-1741426",
               "CSAFPID-1741432",
               "CSAFPID-1741413",
               "CSAFPID-1741415",
               "CSAFPID-1741410",
               "CSAFPID-1741406",
               "CSAFPID-1741424",
               "CSAFPID-1741409",
               "CSAFPID-1741421",
               "CSAFPID-1741417",
               "CSAFPID-1741407",
               "CSAFPID-1741427",
               "CSAFPID-1741412",
               "CSAFPID-1741416",
               "CSAFPID-1741418",
               "CSAFPID-1741431",
               "CSAFPID-1741405",
               "CSAFPID-1741422",
               "CSAFPID-1741420",
               "CSAFPID-1741414",
               "CSAFPID-1741425",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49105",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49105.json",
            },
         ],
         title: "CVE-2024-49105",
      },
      {
         cve: "CVE-2024-49107",
         cwe: {
            id: "CWE-59",
            name: "Improper Link Resolution Before File Access ('Link Following')",
         },
         notes: [
            {
               category: "other",
               text: "Improper Link Resolution Before File Access ('Link Following')",
               title: "CWE-59",
            },
            {
               category: "other",
               text: "Improper Access Control",
               title: "CWE-284",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49107",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49107.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
               ],
            },
         ],
         title: "CVE-2024-49107",
      },
      {
         cve: "CVE-2024-49111",
         cwe: {
            id: "CWE-125",
            name: "Out-of-bounds Read",
         },
         notes: [
            {
               category: "other",
               text: "Out-of-bounds Read",
               title: "CWE-125",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49111",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49111.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
               ],
            },
         ],
         title: "CVE-2024-49111",
      },
      {
         cve: "CVE-2024-49121",
         cwe: {
            id: "CWE-476",
            name: "NULL Pointer Dereference",
         },
         notes: [
            {
               category: "other",
               text: "NULL Pointer Dereference",
               title: "CWE-476",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49121",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49121.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49121",
      },
      {
         cve: "CVE-2024-49122",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         notes: [
            {
               category: "other",
               text: "Use After Free",
               title: "CWE-416",
            },
         ],
         product_status: {
            known_affected: [
               "CSAFPID-1741405",
               "CSAFPID-1741406",
               "CSAFPID-1741407",
               "CSAFPID-1741422",
               "CSAFPID-1741408",
               "CSAFPID-1741409",
               "CSAFPID-1741410",
               "CSAFPID-1741411",
               "CSAFPID-1741412",
               "CSAFPID-1741413",
               "CSAFPID-1741414",
               "CSAFPID-1741415",
               "CSAFPID-1741416",
               "CSAFPID-1741417",
               "CSAFPID-1741418",
               "CSAFPID-1741419",
               "CSAFPID-1741420",
               "CSAFPID-1741421",
               "CSAFPID-1741423",
               "CSAFPID-1741424",
               "CSAFPID-1741425",
               "CSAFPID-1741426",
               "CSAFPID-1741427",
               "CSAFPID-1741428",
               "CSAFPID-1741429",
               "CSAFPID-1741430",
               "CSAFPID-1741431",
               "CSAFPID-1741432",
               "CSAFPID-1720442",
               "CSAFPID-1717808",
               "CSAFPID-1717809",
               "CSAFPID-1717810",
               "CSAFPID-1741366",
               "CSAFPID-1741367",
               "CSAFPID-1741368",
               "CSAFPID-1741354",
               "CSAFPID-1741369",
               "CSAFPID-1741370",
               "CSAFPID-1741352",
               "CSAFPID-1741371",
               "CSAFPID-1741353",
               "CSAFPID-1723936",
               "CSAFPID-1723937",
               "CSAFPID-1717812",
               "CSAFPID-1717813",
               "CSAFPID-1723941",
               "CSAFPID-1723942",
               "CSAFPID-1723943",
               "CSAFPID-1723944",
               "CSAFPID-1723945",
               "CSAFPID-1717820",
               "CSAFPID-1717821",
               "CSAFPID-1717822",
               "CSAFPID-1717823",
            ],
         },
         references: [
            {
               category: "self",
               summary: "CVE-2024-49122",
               url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49122.json",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-1741405",
                  "CSAFPID-1741406",
                  "CSAFPID-1741407",
                  "CSAFPID-1741422",
                  "CSAFPID-1741408",
                  "CSAFPID-1741409",
                  "CSAFPID-1741410",
                  "CSAFPID-1741411",
                  "CSAFPID-1741412",
                  "CSAFPID-1741413",
                  "CSAFPID-1741414",
                  "CSAFPID-1741415",
                  "CSAFPID-1741416",
                  "CSAFPID-1741417",
                  "CSAFPID-1741418",
                  "CSAFPID-1741419",
                  "CSAFPID-1741420",
                  "CSAFPID-1741421",
                  "CSAFPID-1741423",
                  "CSAFPID-1741424",
                  "CSAFPID-1741425",
                  "CSAFPID-1741426",
                  "CSAFPID-1741427",
                  "CSAFPID-1741428",
                  "CSAFPID-1741429",
                  "CSAFPID-1741430",
                  "CSAFPID-1741431",
                  "CSAFPID-1741432",
                  "CSAFPID-1720442",
                  "CSAFPID-1717808",
                  "CSAFPID-1717809",
                  "CSAFPID-1717810",
                  "CSAFPID-1741366",
                  "CSAFPID-1741367",
                  "CSAFPID-1741368",
                  "CSAFPID-1741354",
                  "CSAFPID-1741369",
                  "CSAFPID-1741370",
                  "CSAFPID-1741352",
                  "CSAFPID-1741371",
                  "CSAFPID-1741353",
                  "CSAFPID-1723936",
                  "CSAFPID-1723937",
                  "CSAFPID-1717812",
                  "CSAFPID-1717813",
                  "CSAFPID-1723941",
                  "CSAFPID-1723942",
                  "CSAFPID-1723943",
                  "CSAFPID-1723944",
                  "CSAFPID-1723945",
                  "CSAFPID-1717820",
                  "CSAFPID-1717821",
                  "CSAFPID-1717822",
                  "CSAFPID-1717823",
               ],
            },
         ],
         title: "CVE-2024-49122",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.