{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T11:56:34.106","vulnerabilities":[{"cve":{"id":"CVE-2024-24964","sourceIdentifier":"vultures@jpcert.or.jp","published":"2024-03-12T08:15:45.327","lastModified":"2025-05-23T14:44:17.253","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper access control vulnerability exists in the resident process of SKYSEA Client View versions from Ver.11.220 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed."},{"lang":"es","value":"Existe una vulnerabilidad de control de acceso inadecuado en el proceso residente de las versiones de SKYSEA Client View desde la versión 11.220 anterior a la versión 19.2. Si se explota esta vulnerabilidad, un usuario que pueda iniciar sesión en la PC donde está instalado el cliente Windows del producto puede ejecutar un proceso arbitrario con privilegios de SYSTEM."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:skygroup:skysea_client_view:*:*:*:*:*:*:*:*","versionStartIncluding":"11.220.05p","versionEndIncluding":"19.101.01a","matchCriteriaId":"E2B90F70-573B-45B2-82C9-6160287071CD"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN54451757/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.skyseaclientview.net/news/240307_01/","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN54451757/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.skyseaclientview.net/news/240307_01/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}