U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-24549

Change History

Initial Analysis by NIST 5/19/2025 9:02:08 AM

Action Type Old Value New Value
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 8.5.0 up to (excluding) 8.5.99
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (excluding) 10.1.19
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (excluding) 9.0.86
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
          *cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
Added Reference Type

								
							
							
						
Apache Software Foundation: http://www.openwall.com/lists/oss-security/2024/03/13/3 Types: Mailing List
Added Reference Type

								
							
							
						
Apache Software Foundation: https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg Types: Vendor Advisory
Added Reference Type

								
							
							
						
Apache Software Foundation: https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
Apache Software Foundation: https://lists.fedoraproject.org/archives/list/[email protected]/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
Apache Software Foundation: https://lists.fedoraproject.org/archives/list/[email protected]/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
Apache Software Foundation: https://security.netapp.com/advisory/ntap-20240402-0002/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.openwall.com/lists/oss-security/2024/03/13/3 Types: Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg Types: Vendor Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.fedoraproject.org/archives/list/[email protected]/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.fedoraproject.org/archives/list/[email protected]/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://security.netapp.com/advisory/ntap-20240402-0002/ Types: Third Party Advisory