{"uuid": "200cd878-bbf2-4891-9188-a28730e95c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1367", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14539", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1367\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \nA command injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Logging parameters, which could lead to the execution of arbitrary code on the Security Center host. \n\n\n\ud83d\udccf Published: 2024-02-14T21:35:16.767Z\n\ud83d\udccf Modified: 2025-05-02T16:26:07.235Z\n\ud83d\udd17 References:\n1. https://www.tenable.com/security/tns-2024-02", "creation_timestamp": "2025-05-02T17:16:46.000000Z"}