Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:
Product
Affected Versions
LoadMaster
From 7.2.55.0 to 7.2.60.1 (inclusive)
From 7.2.49.0 to 7.2.54.12 (inclusive)
7.2.48.12 and all prior versions
Multi-Tenant Hypervisor
7.1.35.12 and all prior versions
ECS
All prior versions to 7.2.60.1 (inclusive)
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kemptechnologies
Kemptechnologies loadmaster |
|
CPEs | cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:* | |
Vendors & Products |
Progress
Progress loadmaster |
Kemptechnologies
Kemptechnologies loadmaster |
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress loadmaster |
|
CPEs | cpe:2.3:a:progress:loadmaster:*:*:*:*:*:*:*:* | |
Vendors & Products |
Progress
Progress loadmaster |
|
Metrics |
ssvc
|
Fri, 11 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects: Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) From 7.2.49.0 to 7.2.54.12 (inclusive) 7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) | |
Title | Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-11-15T20:05:53.028Z
Reserved: 2024-09-12T14:52:47.333Z
Link: CVE-2024-8755

Updated: 2024-10-11T14:59:32.220Z

Status : Awaiting Analysis
Published: 2024-10-11T15:15:06.150
Modified: 2024-11-15T21:15:11.443
Link: CVE-2024-8755

No data.