{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T15:38:53.527","vulnerabilities":[{"cve":{"id":"CVE-2024-0947","sourceIdentifier":"iletisim@usom.gov.tr","published":"2024-06-27T10:15:11.563","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Reliance on Cookies without Validation and Integrity Checking vulnerability in Talya Informatics Elektraweb allows Session Credential Falsification through Manipulation, Accessing/Intercepting/Modifying HTTP Cookies, Manipulating Opaque Client-based Data Tokens.This issue affects Elektraweb: before v17.0.68."},{"lang":"es","value":"Vulnerabilidad de dependencia de cookies sin validación y verificación de integridad en Talya Informatics Elektraweb permite la falsificación de credenciales de sesión mediante manipulación, acceso/interceptación/modificación de cookies HTTP y manipulación de tokens de datos opacos basados ??en el cliente. Este problema afecta a Elektraweb: antes de v17.0.68."}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-565"}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-24-0808","source":"iletisim@usom.gov.tr"},{"url":"https://www.usom.gov.tr/bildirim/tr-24-0808","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}