{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T18:23:44.401","vulnerabilities":[{"cve":{"id":"CVE-2024-13960","sourceIdentifier":"security@nortonlifelock.com","published":"2025-05-09T16:15:23.473","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Link Following Local Privilege Escalation Vulnerability in TuneUp Service in AVG TuneUp Version 23.4 (build 15592) on Windows 10 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack."},{"lang":"es","value":"La vulnerabilidad de escalada de privilegios locales mediante seguimiento de enlaces en el servicio TuneUp de AVG TuneUp versión 23.4 (compilación 15592) en Windows 10 permite a atacantes locales escalar privilegios y ejecutar código arbitrario en el contexto del SYSTEM mediante la creación de un enlace simbólico y aprovechando un ataque TOCTTOU (tiempo de verificación a tiempo de uso)."}],"metrics":{"cvssMetricV31":[{"source":"security@nortonlifelock.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@nortonlifelock.com","type":"Secondary","description":[{"lang":"en","value":"CWE-59"},{"lang":"en","value":"CWE-367"}]}],"references":[{"url":"https://www.gendigital.com/us/en/contact-us/security-advisories/","source":"security@nortonlifelock.com"}]}}]}