{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T02:28:26.294","vulnerabilities":[{"cve":{"id":"CVE-2024-1965","sourceIdentifier":"cve-coordination@incibe.es","published":"2024-02-28T13:15:07.987","lastModified":"2025-04-10T19:26:56.720","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Server-Side Request Forgery vulnerability in Haivision's Aviwest Manager and Aviwest Steamhub. This vulnerability could allow an attacker to enumerate internal network configuration without the need for credentials. An attacker could compromise an internal server and retrieve requests sent by other users."},{"lang":"es","value":"Vulnerabilidad de Server-Side Request Forgery en Aviwest Manager y Aviwest Steamhub de Haivision. Esta vulnerabilidad podría permitir a un atacante enumerar la configuración de red interna sin necesidad de credenciales. Un atacante podría comprometer un servidor interno y recuperar solicitudes enviadas por otros usuarios."}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:haivision:maanager:*:*:*:*:*:*:*:*","matchCriteriaId":"919B2376-4F8F-4027-9E69-A9733D3B2930"},{"vulnerable":true,"criteria":"cpe:2.3:a:haivision:streamhub:*:*:*:*:*:*:*:*","matchCriteriaId":"9F7C8DC0-28A9-459B-9603-FD129EBBD050"}]}]}],"references":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-vulnerability-haivision-products","source":"cve-coordination@incibe.es","tags":["Third Party Advisory"]},{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-vulnerability-haivision-products","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}