nciipc.gov.in Open in urlscan Pro
164.100.59.137  Public Scan

URL: https://nciipc.gov.in/advisories/CVE/CVE-KB/2024/Oct.html
Submission: On October 30 via api from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

NCIIPC

× Home About Us Documents Updates Forms Links Events Contact
☰


NATIONAL CRITICAL INFORMATION INFRASTRUCTURE PROTECTION CENTRE

A UNIT OF NATIONAL TECHNICAL RESEARCH ORGANISATION


NCIIPC

 * Home
 * About Us
 * Documents
 * Updates
 * Forms
 * Links
 * Events
 * Contact




                                         


  CVE - KB CORRELATION, OCT 2024  



Published on: 18 Oct, 2024

Cyber Security Vulnerabilities are usually identified using its unique CVE
(Common Vulnerabilities and Exposures) number. However, Microsoft's SCCM (System
Center Configuration Manager) provides patch information in the form of
Knowledge Base (KB) Articles that are associated to one or more CVEs. Microsoft
released updates to address multiple vulnerabilities in its software for the
month of October.

Below is the list of CVE IDs, Base Score, Temporal Score and Knowledge Base IDs
as released by Microsoft during October 2024:-



S No. CVE Base Score Temporal Score KB 1. CVE-2024-20659 7.1 6.6 KB5044284,
KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 2.
CVE-2024-30092 8 7 KB5044284, KB5044293, KB5044286, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281, KB5044277 3. CVE-2024-37976 6.7 5.8 KB5044343,
KB5044342, KB5044293, KB5044286, KB5044288, KB5044285, KB5044273, KB5044280,
KB5044281, KB5044277, KB5044284 4. CVE-2024-37979 6.7 5.8 KB5044343, KB5044342,
KB5044293, KB5044281, KB5044277 5. CVE-2024-37982 6.7 5.8 KB5044343, KB5044342,
KB5044293, KB5044286, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281,
KB5044277, KB5044284 6. CVE-2024-37983 6.7 5.8 KB5044273, KB5044285, KB5044343,
KB5044342, KB5044293, KB5044286, KB5044288, KB5044280, KB5044281, KB5044277,
KB5044284 7. CVE-2024-38029 7.5 6.5 KB5044288 8. CVE-2024-38097 7.1 6.2 Release
Notes 9. CVE-2024-38124 9 7.8 KB5044343, KB5044342, KB5044356, KB5044321,
KB5044320, KB5044306, KB5044293, KB5044288, KB5044281, KB5044277 10.
CVE-2024-38129 7.5 6.5 KB5044288 11. CVE-2024-38149 7.5 6.5 KB5044284,
KB5044343, KB5044342, KB5044356, KB5044321, KB5044293, KB5044286, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 12. CVE-2024-38179 8.8 7.7
Release Notes, Release Notes 13. CVE-2024-38212 8.8 7.7 KB5044343, KB5044342,
KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288, KB5044281,
KB5044277 14. CVE-2024-38229 8.1 7.1 Release Notes, KB5045993 15. CVE-2024-38261
7.8 6.8 KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306,
KB5044293, KB5044288, KB5044281, KB5044277 16. CVE-2024-38262 7.5 6.5 KB5044343,
KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288,
KB5044281, KB5044277 17. CVE-2024-38265 8.8 7.7 KB5044343, KB5044342, KB5044356,
KB5044321, KB5044320, KB5044306, KB5044293, KB5044288, KB5044281, KB5044277 18.
CVE-2024-43453 8.8 7.7 KB5044277, KB5044343, KB5044342, KB5044356, KB5044321,
KB5044320, KB5044306, KB5044293, KB5044288, KB5044281 19. CVE-2024-43456 4.8 4.2
KB5044343, KB5044342, KB5044356, KB5044321, KB5044293, KB5044288, KB5044281,
KB5044277 20. CVE-2024-43468 9.8 8.5 KB29166583 21. CVE-2024-43480 6.6 5.8
Release Notes, Release Notes, Release Notes 22. CVE-2024-43481 6.5 5.7 Release
Notes 23. CVE-2024-43483 7.5 6.5 KB5044021, KB5044030, KB5044095, KB5044085,
KB5044097, KB5044096, KB5044098, KB5044086, KB5044086, KB5044286, KB5044028,
KB5044033, KB5044091, KB5044090, KB5044092, KB5044092, KB5044099, KB5044089,
KB5045993, KB5045998, Release Notes 24. CVE-2024-43484 7.5 6.5 KB5044033,
KB5044090, KB5044092, KB5044030, KB5044099, KB5044089, KB5044095, KB5044085,
KB5044096, KB5044021, KB5044097, KB5044098, KB5044086, KB5044086, KB5044286,
KB5044028, KB5044091, KB5044092, KB5044293, KB5045993, KB5045998, Release Notes
25. CVE-2024-43485 7.5 6.5 KB5045993, KB5045998, Release Notes 26.
CVE-2024-43488 8.8 7.7 N/A 27. CVE-2024-43497 8.4 7.3 Release Notes 28.
CVE-2024-43500 5.5 4.8 KB5044284, KB5044288, KB5044285 29. CVE-2024-43501 7.8
6.8 KB5044284, KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306,
KB5044293, KB5044286, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281,
KB5044277 30. CVE-2024-43502 7.1 6.2 KB5044273, KB5044277 31. CVE-2024-43503 7.8
6.8 KB5002649, KB5002647, KB5002645 32. CVE-2024-43504 7.8 6.8 KB5002643, Click
to Run, Click to Run 33. CVE-2024-43504     KB5002643, Click to Run, Click to
Run 34. CVE-2024-43505 7.8 6.8 Click to Run, Click to Run 35. CVE-2024-43506 7.5
6.5 KB5044273, KB5044280, KB5044343, KB5044342, KB5044356, KB5044321, KB5044293,
KB5044286, KB5044284, KB5044288, KB5044285, KB5044281, KB5044277 36.
CVE-2024-43508 5.5 4.8 KB5044284, KB5044288, KB5044285 37. CVE-2024-43509 7.8
6.8 KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293,
KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281,
KB5044277 38. CVE-2024-43511 7 6.1 KB5044293, KB5044286, KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 39. CVE-2024-43512 6.5 5.7
KB5044343, KB5044293, KB5044281, KB5044277 40. CVE-2024-43513 6.4 5.6 KB5044343,
KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280,
KB5044281, KB5044277 41. CVE-2024-43514 7.8 6.8 KB5044343, KB5044342, KB5044293,
KB5044286, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277,
KB5044284 42. CVE-2024-43515 7.5 6.5 KB5044343, KB5044342, KB5044356, KB5044321,
KB5044320, KB5044306, KB5044293, KB5044286, KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281, KB5044277 43. CVE-2024-43516 7.8 6.8 KB5044293,
KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281,
KB5044277 44. CVE-2024-43517 8.8 7.7 KB5044343, KB5044342, KB5044356, KB5044321,
KB5044320, KB5044306, KB5044293, KB5044286, KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281, KB5044277 45. CVE-2024-43518 8.8 7.7 KB5044281,
KB5044277, KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306,
KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280 46.
CVE-2024-43519 8.8 7.7 KB5044343, KB5044342, KB5044356, KB5044321, KB5044320,
KB5044306, KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044281, KB5044277 47. CVE-2024-43520 5 4.4 KB5044286, KB5044284,
KB5044288, KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306,
KB5044293, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 48.
CVE-2024-43521 7.5 6.5 KB5044343, KB5044342, KB5044293, KB5044288, KB5044281,
KB5044277 49. CVE-2024-43522 7 6.1 KB5044285 50. CVE-2024-43523 6.8 5.9
KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044277 51.
CVE-2024-43524 6.8 5.9 KB5044284, KB5044288, KB5044285, KB5044273, KB5044280,
KB5044277 52. CVE-2024-43525 6.8 5.9 KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044277 53. CVE-2024-43526 6.8 5.9 KB5044273, KB5044285, KB5044284,
KB5044288, KB5044280, KB5044277 54. CVE-2024-43527 7.8 6.8 KB5044284 55.
CVE-2024-43528 7.8 6.8 KB5044284, KB5044288, KB5044285, KB5044273, KB5044280,
KB5044281, KB5044277 56. CVE-2024-43529 7.3 6.4 KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281 57. CVE-2024-43532 8.8 7.7 KB5044343, KB5044342,
KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044286, KB5044284,
KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 58.
CVE-2024-43533 8.8 7.7 KB5044284, KB5044288, KB5044285, KB5044280, KB5044281,
Release Notes 59. CVE-2024-43534 6.5 5.7 KB5044293, KB5044286, KB5044284,
KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 60. CVE-2024-43535 7 6.1
KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293,
KB5044286, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277,
KB5044284 61. CVE-2024-43536 6.8 5.9 KB5044273, KB5044285, KB5044284, KB5044288,
KB5044280, KB5044277 62. CVE-2024-43537 6.5 5.7 KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044277 63. CVE-2024-43538 6.5 5.7 KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044277 64. CVE-2024-43540 6.5 5.7 KB5044273,
KB5044285, KB5044284, KB5044288, KB5044280, KB5044277 65. CVE-2024-43541 7.5 6.5
KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293,
KB5044288, KB5044281, KB5044277 66. CVE-2024-43542 6.5 5.7 KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044277 67. CVE-2024-43543 6.8 5.9 KB5044284,
KB5044288, KB5044285, KB5044273, KB5044280, KB5044277 68. CVE-2024-43544 7.5 6.5
KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293,
KB5044288, KB5044281, KB5044277 69. CVE-2024-43545 7.5 6.5 KB5044343, KB5044342,
KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288, KB5044281,
KB5044277 70. CVE-2024-43546 5.6 4.9 KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044281 71. CVE-2024-43547 6.5 5.7 KB5044343, KB5044342, KB5044356,
KB5044321, KB5044320, KB5044306, KB5044293, KB5044286, KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 72. CVE-2024-43549 8.8 7.7
KB5044288, KB5044281, KB5044277, KB5044343, KB5044342, KB5044356, KB5044321,
KB5044320, KB5044306, KB5044293 73. CVE-2024-43550 7.4 6.4 KB5044343, KB5044342,
KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280,
KB5044281, KB5044277 74. CVE-2024-43551 7.8 6.8 KB5044293, KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 75. CVE-2024-43552 7.3 6.4
KB5044284, KB5044288, KB5044285 76. CVE-2024-43553 7.4 6.4 KB5044293, KB5044286,
KB5044284, KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306,
KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 77.
CVE-2024-43554 5.5 4.8 KB5044293, KB5044286, KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281, KB5044277 78. CVE-2024-43555 6.5 5.7 KB5044284,
KB5044288, KB5044285, KB5044273, KB5044280, KB5044277 79. CVE-2024-43556 7.8 6.8
KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293,
KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281,
KB5044277 80. CVE-2024-43557 6.5 5.7 KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044277 81. CVE-2024-43558 6.5 5.7 KB5044273, KB5044285, KB5044284,
KB5044288, KB5044280, KB5044277 82. CVE-2024-43559 6.5 5.7 KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044277 83. CVE-2024-43560 7.8 6.8 KB5044343,
KB5044342, KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044281, KB5044277 84. CVE-2024-43561 6.5 5.7 KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044277 85. CVE-2024-43562 7.5 6.5 KB5044293,
KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281,
KB5044277 86. CVE-2024-43563 7.8 6.8 KB5044343, KB5044342, KB5044293, KB5044286,
KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 87.
CVE-2024-43564 8.8 7.7 KB5044343, KB5044342, KB5044356, KB5044321, KB5044320,
KB5044306, KB5044293, KB5044288, KB5044281, KB5044277 88. CVE-2024-43565 7.5 6.5
KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273, KB5044280,
KB5044281, KB5044277 89. CVE-2024-43567 7.5 6.5 KB5044343, KB5044342, KB5044293,
KB5044288, KB5044281, KB5044277 90. CVE-2024-43570 6.4 5.6 KB5044273, KB5044280,
KB5044343, KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293,
KB5044286, KB5044288, KB5044285, KB5044281, KB5044277, KB5044284 91.
CVE-2024-43571 5.6 4.9 KB5044284 92. CVE-2024-43572 7.8 7.2 KB5044343,
KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044286,
KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 93.
CVE-2024-43573 6.5 6 KB5044285, KB5044273, KB5044288, KB5044281, KB5044343,
KB5044293, KB5044286, KB5044284, KB5044277, KB5044280 94. CVE-2024-43574 8.3 7.2
KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281 95.
CVE-2024-43575 7.5 6.5 KB5044293, KB5044288, KB5044281, KB5044277 96.
CVE-2024-43576     Click to Run, Click to Run 97. CVE-2024-43576 7.8 6.8 Click
to Run, Click to Run 98. CVE-2024-43581 7.1 6.2 KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281, KB5044277 99. CVE-2024-43582 8.1 7.1 KB5044285,
KB5044273, KB5044284, KB5044288, KB5044280, KB5044281, KB5044277 100.
CVE-2024-43583 7.8 6.8 KB5044343, KB5044342, KB5044356, KB5044321, KB5044320,
KB5044306, KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044281, KB5044277 101. CVE-2024-43584 7.7 6.7 KB5044284,
KB5044288, KB5044285, KB5044280, KB5044281 102. CVE-2024-43585 5.5 4.8
KB5044284, KB5044288, KB5044285, KB5044273, KB5044280, KB5044281, KB5044277 103.
CVE-2024-43589 8.8 8.1 KB5044343, KB5044342, KB5044356, KB5044321, KB5044320,
KB5044306, KB5044293, KB5044288, KB5044281, KB5044277 104. CVE-2024-43590 7.8
6.8 Release Notes, Release Notes, Release Note s, Release Notes 105.
CVE-2024-43591 8.7 7.6 Release Notes 106. CVE-2024-43592 8.8 7.7 KB5044343,
KB5044342, KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288,
KB5044281, KB5044277 107. CVE-2024-43593 8.8 7.7 KB5044343, KB5044342,
KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288, KB5044281,
KB5044277 108. CVE-2024-43599 8.8 7.7 KB5044343, KB5044342, KB5044356,
KB5044321, KB5044293, KB5044286, KB5044284, KB5044288, KB5044285, KB5044273,
KB5044280, KB5044281, KB5044277 109. CVE-2024-43601 7.1 6.2 Release Notes 110.
CVE-2024-43603 5.5 4.8 KB5045536, Release Notes, Release Notes, Release Notes
111. CVE-2024-43604 5.7 5 Release Notes 112. CVE-2024-43607 8.8 7.7 KB5044293,
KB5044288, KB5044281, KB5044277, KB5044343, KB5044342, KB5044356, KB5044321,
KB5044320, KB5044306 113. CVE-2024-43608 8.8 7.7 KB5044343, KB5044342,
KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288, KB5044281,
KB5044277 114. CVE-2024-43609 6.5 5.7 KB5002635, Click to Run, Click to Run 115.
CVE-2024-43610 7.4 6.4 N/A 116. CVE-2024-43611 8.8 7.7 KB5044343, KB5044342,
KB5044356, KB5044321, KB5044320, KB5044306, KB5044293, KB5044288, KB5044281,
KB5044277 117. CVE-2024-43612 6.9 6 Release Notes 118. CVE-2024-43614 5.5 4.8
Release Notes 119. CVE-2024-43615 7.1 6.2 KB5044284, KB5044288, KB5044285,
KB5044273, KB5044280, KB5044281, KB5044277 120. CVE-2024-43616 7.8 6.8 Click to
Run, Click to Run 121. CVE-2024-6197 8.8 7.7 curl, KB5044284, KB5044288,
KB5044285, KB5044273, KB5044280, KB5044281, KB5044277



REFERENCES:


 1. https://msrc.microsoft.com/update-guide/releaseNote/2024-Oct
 2. https://portal.msrc.microsoft.com/en-us/security-guidance

Tenders | Recruitments
Copyright Policy | Hyperlinking Policy | Privacy Policy | Terms & Conditions |
Web Information Manager | Feedback

This Website is Designed, Developed and Maintained by NCIIPC (A unit of NTRO),
Government of India

Copyright © 2017 - NCIIPC | All Rights Reserved

Web Information Manager

Director A&A
Block III, Old JNU Campus
New Delhi - 110 067
Email: web.admin@gov[.]in
Toll Free: 1800-11-4430


Copyright Policy

Material featured on this website is subject to copyright protection unless
otherwise indicated. The material may be downloaded without requiring specific
prior permission. Any other proposed use of the material is subject to the
approval of NCIIPC. Application for obtaining permission should be made to Web
Information Manager.

Feedback

Any feedback related to content, design, service or technological issues w.r.t
NCIIPC website maybe sent to:

Web Information Manager
Director A&A
Block III, Old JNU Campus
New Delhi - 110 067
Email: web.admin@gov[.]in
Toll Free: 1800-11-4430


Hyperlinking Policy

Links to external websites/portals

At many places in this website, you shall find links to other websites/portals.
These links have been placed for your convenience. NCIIPC is not responsible for
the contents and reliability of the linked websites and does not necessarily
endorse the views expressed in them. Mere presence of the link or its listing on
this website should not be assumed as endorsement of any kind. NCIIPC can
neither guarantee that these links will work all the time nor it has any control
over availability of linked pages.

Links to NCIIPC website by other websites

NCIIPC does not object to linking directly to the information that is hosted on
this website and no prior permission is required for the same. However, we would
like you to inform us about any links provided to this website so that you can
be informed of any changes or updates therein. Also, we do not permit our pages
to be loaded into frames on your site. The pages belonging to this Portal must
load into a newly opened browser tab/window of the User.



Privacy Policy

Thanks for visiting website of NCIIPC, and reviewing our privacy policy. We
collect no personal information, like names or addresses, when you visit our
website. If you choose to provide that information to us, it is only used to
fulfil your request for information. We do collect some technical information
when you visit to make your visit seamless. The section below explains how we
handle and collect technical information when you visit our website.

Information collected and stored automatically: When you browse, read pages, or
download information on this website, we automatically gather and store certain
technical information about your visit. This information never identifies who
you are. The information we collect and store about your visit is listed below-


 * The Internet domain of your service provider and IP address (an IP address is
   a number that is automatically assigned to your computer whenever you are
   surfing the web) from which you access our website.
 * The type of browser (such as Firefox, Netscape, or Internet Explorer) and
   operating system (Windows, Linux) used to access our site.
 * The date and time you access/accessed our site.
 * The pages/URLs you have visited, and
 * If you reached this website from another website, the address of that
   referring website.

This information is only used to help us make the site more useful for you. With
this data, we learn about the number of visitors to our site and the types of
technology our visitors use. We never track or record information about
individuals and their visits.



Next


Privacy Policy

Cookies: We only use non-persistent cookies or “per-session cookies”.
Per-session cookies serve technical purposes, like providing seamless navigation
through this website. These cookies do not collect personal information on users
and they are deleted as soon as you leave our website. The cookies do not
permanently record data and they are not stored on your computer’s hard drive.
The cookies are stored in memory and are only available during an active browser
session. Again, once you close your browser, the cookie disappears.

If you send us personal information: We do not collect personal information for
any purpose other than to respond to you. If you choose to provide us with
personal information, like filling out a form, with an e-mail address or postal
address, we use that information to respond to your message, and to help you get
the information you have requested. We only share the information you give us
with another Government agency if your question relates to that agency, or as
otherwise required by law. Our website never collects information or creates
individual profiles for commercial marketing. While you must provide an email
address for a localised response to any incoming questions or comments to us, we
recommend that you do NOT include any other personal information.

Site Security:


 * For site security purposes and to ensure that this service remains available
   to all users, this Government computer system employs commercial software
   programs to monitor network traffic to identify unauthorised attempts to
   upload or change information, or otherwise cause damage.
 * Except for authorised law enforcement investigations, no other attempts are
   made to identify individual users or their usage habits. Raw data logs are
   used for no other purposes and are scheduled for regular deletion.
 * Unauthorised attempts to upload information or change information on this
   service are strictly prohibited and may be punishable under the Indian or Act
   (2000).

Previous


Terms & Conditions

This website is designed, developed and maintained by NCIIPC (A unit of NTRO),
Government of India.

Though all efforts have been made to ensure the accuracy of the content on this
website, the same should not be construed as a statement of law or used for any
legal purposes. In case of any ambiguity or doubts, users are advised to
verify/check with the Department to obtain appropriate professional advice.

Under no circumstances will this Department be liable for any expense, loss or
damage including, without limitation, indirect or consequential loss or damage,
or any expense, loss or damage whatsoever arising from use, or loss of use, of
data, arising out of or in connection with the use of this website. These terms
and conditions shall be governed by and construed in accordance with the Indian
Laws. Any dispute arising under these terms and conditions shall be subject to
the jurisdiction of the courts of India.

The information posted on this website could include hypertext links or pointers
to information created and maintained by non-Government/private organisations.
NCIIPC is providing these links and pointers solely for your information and
convenience. When you select a link to an outside website, you are leaving the
NCIIPC website and are subject to the privacy and security policies of the
owners of the outside website. NCIIPC does not guarantee the availability of
such linked pages at all times. NCIIPC cannot authorise the use of copyrighted
materials contained in linked websites. Users are advised to request such
authorisation from the owner of the linked website. NCIIPC does not guarantee
that linked websites comply with Indian Government Web Guidelines.