{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/257991?format=json","vulnerability_id":"VCID-118c-t8t8-pbgf","summary":"A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e84` of v1.2.10.9 of the P3-550E firmware.","aliases":[{"alias":"CVE-2024-24963"}],"fixed_packages":[],"affected_packages":[],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24963","reference_id":"","reference_type":"","scores":[{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66571","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24963"},{"reference_url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939","reference_id":"TALOS-2024-1939","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-29T00:58:21Z/"}],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939"},{"reference_url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939","reference_id":"TALOS-2024-1939","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-29T00:58:21Z/"}],"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939"}],"weaknesses":[{"cwe_id":121,"name":"Stack-based Buffer Overflow","description":"A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function)."}],"exploits":[],"severity_range_score":"9.8 - 9.8","exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-118c-t8t8-pbgf"}