U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVSS v3.1 Statistics for VulDB as of 02/20/2025

6027
320
 
40
211
Reference
0-69.9%
Provider
65.9
Contributor
70-94.9%
 
Provider
95-100%
CVE CNA Value Alignment NIST Value Reason
CVE-2024-2684   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4646   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4647   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4648   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4649   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4650   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4651   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4652   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4672   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4673   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4674   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4675   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4676   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4677   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4678   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4682   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4683   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4684   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4685   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4686   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4687   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4688   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4713   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4714   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4715   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4716   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4717   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4718   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4719   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4726   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4727   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4728   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4729   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4730   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4731   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4732   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4735   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4736   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4737   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2024-4738   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) None Confidentiality (C) Low Information leaked appears non-critical/sensitive
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None