{"uuid": "3cd4f62b-9448-420f-8f34-09303d2c0f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50967", "type": "seen", "source": "https://t.me/cvedetector/15706", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50967 - Becon DATAGerry Incorrect Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50967 \nPublished : Jan. 17, 2025, 3:15 p.m. | 32\u00a0minutes ago \nDescription : The /rest/rights/ REST API endpoint in Becon DATAGerry through 2.2.0 contains an Incorrect Access Control vulnerability. An attacker can remotely access this endpoint without authentication, leading to unauthorized disclosure of sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T16:47:31.000000Z"}