{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:16:10.237","vulnerabilities":[{"cve":{"id":"CVE-2024-47977","sourceIdentifier":"security_alert@emc.com","published":"2024-12-10T11:15:07.550","lastModified":"2025-08-04T19:15:29.837","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Dell Avamar, versions prior to 19.12 with patch 338905, excluding 19.10 and 19.10SP1 with patch 338869, contains an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution."},{"lang":"es","value":"Dell Avamar, versión 19.9, contiene una vulnerabilidad de neutralización incorrecta de elementos especiales utilizados en un comando SQL (\"inyección SQL\"). Un atacante con privilegios reducidos y acceso remoto podría aprovechar esta vulnerabilidad y provocar la ejecución del comando."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dell:avamar_server:19.4:*:*:*:*:*:*:*","matchCriteriaId":"A19DD36F-1EE9-4FBF-9968-DF270C5FD1C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:avamar_server:19.7:*:*:*:*:*:*:*","matchCriteriaId":"D8C50D2C-B787-4366-AAED-057F9439A6A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:avamar_server:19.8:*:*:*:*:*:*:*","matchCriteriaId":"41028ABC-C574-42AE-897B-E1C65CD0D0BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:avamar_server:19.9:*:*:*:*:*:*:*","matchCriteriaId":"2B1D9257-AA6C-4D68-B209-E72128A017D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:avamar_server:19.10:-:*:*:*:*:*:*","matchCriteriaId":"7ADB97BD-3E80-439D-950C-93EF391DDA8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:avamar_server:19.10:sp1:*:*:*:*:*:*","matchCriteriaId":"D0075FDA-26E4-4687-9D94-21283E2B5028"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dell:avamar_data_store:gen4t:*:*:*:*:*:*:*","matchCriteriaId":"7B67D705-545D-44A2-BA4B-6E5108FB06CD"},{"vulnerable":false,"criteria":"cpe:2.3:h:dell:avamar_data_store:gen5a:*:*:*:*:*:*:*","matchCriteriaId":"9DFA5C46-9E8C-4EF9-A1F1-133ABB34C6B6"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000258636/dsa-2024-489-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-security-update-for-multiple-vulnerabilities","source":"security_alert@emc.com","tags":["Vendor Advisory"]}]}}]}