{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T03:09:20.747","vulnerabilities":[{"cve":{"id":"CVE-2024-56135","sourceIdentifier":"security@progress.com","published":"2025-02-05T18:15:29.210","lastModified":"2025-07-31T13:47:09.340","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n Product \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)"},{"lang":"es","value":"Vulnerabilidad de validación de entrada incorrecta de usuario autenticado en progreso LoadMaster permite: Inyección de comandos del sistema operativo. Este problema afecta a: Producto Versiones afectadas LoadMaster De 7.2.55.0 a 7.2.60.1 (incluida) De 7.2.49.0 a 7.2.54.12 (incluida) 7.2.48.12 y todas las versiones anteriores ECS Todas las versiones anteriores a 7.2.60.1 (incluida)"}],"metrics":{"cvssMetricV31":[{"source":"security@progress.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@progress.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:multi-tenant_loadmaster:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1.35.13","matchCriteriaId":"AAEF2ABC-DFB1-4C90-BCF6-CD5176FA4559"},{"vulnerable":true,"criteria":"cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*","versionEndIncluding":"7.2.48.12","matchCriteriaId":"8BF6DDA7-65D0-4678-8F19-CAB4A158EA25"},{"vulnerable":true,"criteria":"cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.49.0","versionEndExcluding":"7.2.54.13","matchCriteriaId":"215681F7-A219-482B-BFCE-262B923BB56E"},{"vulnerable":true,"criteria":"cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.55.0","versionEndExcluding":"7.2.61.0","matchCriteriaId":"15177F19-9252-4151-93D9-850CCAC8E6EB"}]}]}],"references":[{"url":"https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135","source":"security@progress.com","tags":["Vendor Advisory"]}]}}]}