{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:40:37.318","vulnerabilities":[{"cve":{"id":"CVE-2024-44575","sourceIdentifier":"cve@mitre.org","published":"2024-09-11T17:15:13.820","lastModified":"2025-04-28T15:14:44.490","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"RELY-PCIe v22.2.1 to v23.1.0 does not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session."},{"lang":"es","value":"RELY-PCIe v22.2.1 a v23.1.0 no establece el atributo Seguro para cookies confidenciales en sesiones HTTPS, lo que podría provocar que el agente de usuario envíe esas cookies en texto plano a través de una sesión HTTP."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"22.2.1","versionEndIncluding":"23.1.0","matchCriteriaId":"293D0284-65A6-43B4-9E25-5B6F06F4350B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*","matchCriteriaId":"56F42305-83EB-4393-95A4-268E3C1DEB81"}]}]}],"references":[{"url":"http://system-on-chip.com","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://www.relyum.com/web/support/vulnerability-report/","source":"cve@mitre.org","tags":["Broken Link"]}]}}]}