{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T13:53:46.295","vulnerabilities":[{"cve":{"id":"CVE-2024-3461","sourceIdentifier":"cvd@cert.pl","published":"2024-05-14T15:41:13.350","lastModified":"2025-02-12T15:37:59.677","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"KioWare for Windows (versions all through 8.35) allows to brute force the PIN number, which protects the application from being closed, as there are no mechanisms preventing a user from excessively guessing the number.\n"},{"lang":"es","value":"KioWare para Windows (versiones hasta 8.35) permite forzar el número PIN por fuerza bruta, lo que protege la aplicación contra el cierre, ya que no existen mecanismos que impidan que un usuario adivine excesivamente el número."}],"metrics":{"cvssMetricV31":[{"source":"cvd@cert.pl","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"cvd@cert.pl","type":"Secondary","description":[{"lang":"en","value":"CWE-307"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-307"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*","versionEndIncluding":"8.35","matchCriteriaId":"FA48DE1E-8A39-439D-BE91-A8FA7E84C1D7"}]}]}],"references":[{"url":"https://cert.pl/en/posts/2024/04/CVE-2024-3459","source":"cvd@cert.pl","tags":["Broken Link","Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/04/CVE-2024-3459","source":"cvd@cert.pl","tags":["Broken Link","Third Party Advisory"]},{"url":"https://www.kioware.com/","source":"cvd@cert.pl","tags":["Product"]},{"url":"https://cert.pl/en/posts/2024/04/CVE-2024-3459","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/04/CVE-2024-3459","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"https://www.kioware.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}