{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T17:39:41.909","vulnerabilities":[{"cve":{"id":"CVE-2024-10094","sourceIdentifier":"security@pega.com","published":"2024-11-20T15:15:08.083","lastModified":"2025-03-10T17:40:08.723","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Pega Platform versions 6.x to Infinity 24.1.1 are affected by an issue with Improper Control of Generation of Code"},{"lang":"es","value":"Las versiones 6.x a Infinity 24.1.1 de Pega Platform se ven afectadas por un problema con el control inadecuado de la generación de código"}],"metrics":{"cvssMetricV31":[{"source":"security@pega.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@pega.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"8.1.9","matchCriteriaId":"AF2C2C81-202E-4438-B260-E25E13663B12"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"8.2","versionEndExcluding":"8.2.8","matchCriteriaId":"9B60ED89-0F45-4A67-8ECD-F3CF9AA32D0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"8.3.0","versionEndExcluding":"8.3.6","matchCriteriaId":"95979B2B-5E3B-45BA-83FC-345A8A2C0A3D"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"8.4.0","versionEndExcluding":"8.4.6","matchCriteriaId":"93B4B63F-1901-43F0-84B8-6BA23A3C7A6E"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5","versionEndExcluding":"8.5.6","matchCriteriaId":"B81846D8-F161-4CDC-BDFF-C0976CA168D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"8.6.0","versionEndExcluding":"8.6.6 ","matchCriteriaId":"C6BE0736-5708-4DA1-AFF1-6DE3AC547987"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"8.7.0","versionEndIncluding":"8.8.5","matchCriteriaId":"3E1F2D18-8614-4F8E-926A-371B58F429B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"23.1.0","versionEndExcluding":"23.1.4 ","matchCriteriaId":"5B4F288B-3CDC-4728-82C2-B2A3AA222789"},{"vulnerable":true,"criteria":"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*","versionStartIncluding":"24.1.0","versionEndExcluding":"24.1.2 ","matchCriteriaId":"463BDA9B-6556-4DA1-921E-43EBD9145D96"}]}]}],"references":[{"url":"https://support.pega.com/support-doc/pega-security-advisory-d24-vulnerability-remediation-note","source":"security@pega.com","tags":["Vendor Advisory"]}]}}]}