{"vulnerability": "CVE-2024-2629", "sightings": [{"uuid": "0526db6f-b213-45a9-b468-da5500fc3c84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26290", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "ed68f0b6-c985-4c57-8252-479422853a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26290", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114156212301691687", "content": "", "creation_timestamp": "2025-03-13T17:06:04.139657Z"}, {"uuid": "ddedfe2b-ea78-47bc-adee-a96e1a1b83d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26293", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114851848579890688", "content": "", "creation_timestamp": "2025-07-14T13:35:31.649248Z"}, {"uuid": "b6ff1fb7-b62b-4bef-a1d2-c31402b9d069", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26290", "type": "seen", "source": "https://t.me/cvedetector/20166", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26290 - Avid NEXIS E-series/F-series/PRO+/System Director Appliance (SDA+) Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26290 \nPublished : March 12, 2025, 8:15 p.m. | 49\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in Avid Avid NEXIS E-series on Linux, Avid Avid NEXIS F-series on Linux, Avid Avid NEXIS PRO+ on Linux, Avid System Director Appliance (SDA+) on Linux allows code execution on underlying operating system with root permissions.This issue affects Avid NEXIS E-series: before 2024.6.0; Avid NEXIS F-series: before 2024.6.0; Avid NEXIS PRO+: before 2024.6.0; System Director Appliance (SDA+): before 2024.6.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T22:53:42.000000Z"}, {"uuid": "144e0506-85a5-42c8-8d98-6db77bc650ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26291", "type": "seen", "source": "MISP/e0a0042d-e47b-4875-b781-99d4428af3c2", "content": "", "creation_timestamp": "2025-09-09T20:51:38.000000Z"}, {"uuid": "d62230fa-7485-4a26-9f81-c05e6b963d49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26291", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mk6vwtpfsj2b", "content": "", "creation_timestamp": "2026-04-23T21:03:11.363306Z"}, {"uuid": "e7c78462-fdf7-4c54-952d-b159b405289d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26291", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-26291.yaml", "content": "", "creation_timestamp": "2026-04-22T07:45:26.000000Z"}, {"uuid": "c56fbef6-1632-485d-b95a-e26a50b1847b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26290", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7373", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26290\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Avid Avid NEXIS E-series on Linux, Avid Avid NEXIS F-series on Linux, Avid Avid NEXIS PRO+ on Linux, Avid System Director Appliance (SDA+) on Linux allows code execution on underlying operating system with root permissions.This issue affects Avid NEXIS E-series: before 2024.6.0; Avid NEXIS F-series: before 2024.6.0; Avid NEXIS PRO+: before 2024.6.0; System Director Appliance (SDA+): before 2024.6.0.\n\ud83d\udccf Published: 2025-03-12T19:45:08.869Z\n\ud83d\udccf Modified: 2025-03-12T20:27:30.076Z\n\ud83d\udd17 References:\n1. https://www.drive-byte.de/en/blog/avid-nexis-agent-multiple-vulnerabilities\n2. https://kb.avid.com/pkb/articles/troubleshooting/en239659", "creation_timestamp": "2025-03-12T20:42:35.000000Z"}, {"uuid": "52b4a5f4-ac01-4ef2-8d02-2912ecb26ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26290", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11943", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26290\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Avid Avid NEXIS E-series on Linux, Avid Avid NEXIS F-series on Linux, Avid Avid NEXIS PRO+ on Linux, Avid System Director Appliance (SDA+) on Linux allows code execution on underlying operating system with root permissions.This issue affects Avid NEXIS E-series: before 2024.6.0; Avid NEXIS F-series: before 2024.6.0; Avid NEXIS PRO+: before 2024.6.0; System Director Appliance (SDA+): before 2024.6.0.\n\ud83d\udccf Published: 2025-03-12T19:45:08.869Z\n\ud83d\udccf Modified: 2025-04-15T22:22:19.344Z\n\ud83d\udd17 References:\n1. https://www.drive-byte.de/en/blog/avid-nexis-agent-multiple-vulnerabilities\n2. https://kb.avid.com/pkb/articles/troubleshooting/en239659", "creation_timestamp": "2025-04-15T22:55:42.000000Z"}, {"uuid": "f73d2061-2f05-4e9a-a16f-29ca381ca8ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26298", "type": "seen", "source": "https://t.me/ctinow/194955", "content": "https://ift.tt/WjaT4le\nCVE-2024-26298", "creation_timestamp": "2024-02-27T23:26:55.000000Z"}, {"uuid": "d06791d3-0bd1-476e-aa82-404fd6ff36d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26296", "type": "seen", "source": "https://t.me/ctinow/194942", "content": "https://ift.tt/hlJf5vF\nCVE-2024-26296", "creation_timestamp": "2024-02-27T23:26:37.000000Z"}, {"uuid": "027eaab8-7037-4eb1-9106-81ed8a755952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26295", "type": "seen", "source": "https://t.me/ctinow/194941", "content": "https://ift.tt/h8DIvaP\nCVE-2024-26295", "creation_timestamp": "2024-02-27T23:26:36.000000Z"}, {"uuid": "e6b56a5d-44c6-4c86-9cc9-8a994314868b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26294", "type": "seen", "source": "https://t.me/ctinow/194940", "content": "https://ift.tt/3v0ldu8\nCVE-2024-26294", "creation_timestamp": "2024-02-27T23:26:35.000000Z"}, {"uuid": "b8895491-30da-47c6-b3ec-23d3fd480273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26296", "type": "seen", "source": "https://t.me/ctinow/194953", "content": "https://ift.tt/hlJf5vF\nCVE-2024-26296", "creation_timestamp": "2024-02-27T23:26:54.000000Z"}, {"uuid": "330ade21-178e-412c-9e16-47511e9b7737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26298", "type": "seen", "source": "https://t.me/ctinow/194944", "content": "https://ift.tt/WjaT4le\nCVE-2024-26298", "creation_timestamp": "2024-02-27T23:26:39.000000Z"}, {"uuid": "947d33ec-3177-4aff-ac6f-005b0a215fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26297", "type": "seen", "source": "https://t.me/ctinow/194954", "content": "https://ift.tt/KXG0wbY\nCVE-2024-26297", "creation_timestamp": "2024-02-27T23:26:54.000000Z"}, {"uuid": "dfbf0fe7-9ee0-4f60-9cc9-95bea308d12b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26299", "type": "seen", "source": "https://t.me/ctinow/194945", "content": "https://ift.tt/2YOP6o8\nCVE-2024-26299", "creation_timestamp": "2024-02-27T23:26:40.000000Z"}, {"uuid": "c3284070-8574-422c-8f21-13aeb9a9f26a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26297", "type": "seen", "source": "https://t.me/ctinow/194943", "content": "https://ift.tt/KXG0wbY\nCVE-2024-26297", "creation_timestamp": "2024-02-27T23:26:38.000000Z"}, {"uuid": "62d35b37-8db4-4716-b4e6-375c4389d4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26294", "type": "seen", "source": "https://t.me/ctinow/194951", "content": "https://ift.tt/3v0ldu8\nCVE-2024-26294", "creation_timestamp": "2024-02-27T23:26:52.000000Z"}, {"uuid": "537d132f-3f52-4335-a088-390281f122b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26295", "type": "seen", "source": "https://t.me/ctinow/194952", "content": "https://ift.tt/h8DIvaP\nCVE-2024-26295", "creation_timestamp": "2024-02-27T23:26:53.000000Z"}]}