{"vulnerability": "CVE-2024-1038", "sightings": [{"uuid": "dc818ee4-127b-43df-9432-cad06556d056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10386", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-305-01", "content": "", "creation_timestamp": "2024-10-31T12:00:00.000000Z"}, {"uuid": "269a658b-3c66-4d69-aa37-875815d6e56e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10387", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-305-01", "content": "", "creation_timestamp": "2024-10-31T12:00:00.000000Z"}, {"uuid": "9ab7c5c2-168d-4d9d-88bb-1e4dae7e8afb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10388", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113508481846696416", "content": "", "creation_timestamp": "2024-11-19T07:39:41.988205Z"}, {"uuid": "f25dbe09-55cf-4585-aa59-2a642a58d6d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10388", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113508494453597855", "content": "", "creation_timestamp": "2024-11-19T07:42:54.274642Z"}, {"uuid": "95836ff7-bb66-4b01-a9b9-058c5f475c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10382", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113514815700194839", "content": "", "creation_timestamp": "2024-11-20T10:30:28.794267Z"}, {"uuid": "972953b8-6c6b-4017-8097-d6eb763123e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10385", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685957516698614", "content": "", "creation_timestamp": "2024-12-20T15:54:05.661195Z"}, {"uuid": "a9ea3413-123b-4e63-bc21-6202990e6197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10385", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldqrull2eo22", "content": "", "creation_timestamp": "2024-12-20T16:15:39.844029Z"}, {"uuid": "c72e4ba2-98d0-4c63-b072-1355040972d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10383", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113963051802726453", "content": "", "creation_timestamp": "2025-02-07T14:22:48.863313Z"}, {"uuid": "17581cf9-2de4-4d65-a536-01af54b1dc7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10383", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhlvemsdp32x", "content": "", "creation_timestamp": "2025-02-07T15:15:46.399958Z"}, {"uuid": "9db82df5-2fb1-4134-bdd6-0fb458db5b07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10383", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113963625250924773", "content": "", "creation_timestamp": "2025-02-07T16:48:39.983860Z"}, {"uuid": "52a90d8b-e5dd-48a6-85c0-484e8e9f6707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10383", "type": "seen", "source": "https://t.me/cvedetector/17507", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10383 - GitLab Web IDE VSCode Fork XSS\", \n  \"Content\": \"CVE ID : CVE-2024-10383 \nPublished : Feb. 7, 2025, 3:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : An issue has been discovered in the gitlab-web-ide-vscode-fork component distributed over CDN affecting all versions prior to 1.89.1-1.0.0-dev-20241118094343and used by all versions of GitLab CE/EE starting from 15.11 prior to 17.3 and which also temporarily affected versions 17.4, 17.5 and 17.6, where a XSS attack was possible when loading .ipynb files in the web IDE \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T18:50:26.000000Z"}, {"uuid": "946facdc-3da9-47d8-88a0-3ace28edebcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10386", "type": "seen", "source": "https://t.me/ics_cert/945", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u067e\u0644\u062a\u0641\u0631\u0645 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0628\u0631\u0646\u0627\u0645\u0647 \u0645\u062a\u0645\u0631\u06a9\u0632 Rockwell Automation ThinManager \u0628\u0627 \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0627\u0631\u0633\u0627\u0644 \u067e\u0631\u0633 \u0648 \u062c\u0648 \u0628\u0647 \u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u062f\u0647 \u0628\u062f\u0648\u0646 \u0627\u0646\u062c\u0627\u0645 \u0645\u0631\u0627\u062d\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0645\u0631\u062a\u0628\u0637 \u0627\u0633\u062a. \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 \u067e\u06cc\u0627\u0645\u200c\u0647\u0627\u06cc \u0633\u0627\u062e\u062a\u0647\u200c\u0634\u062f\u0647 \u0645\u062e\u0635\u0648\u0635\u060c \u062a\u063a\u06cc\u06cc\u0631\u0627\u062a\u06cc \u062f\u0631 \u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u062f\u0647 \u0627\u06cc\u062c\u0627\u062f \u06a9\u0646\u062f.\n\nBDU: 2024-08913\nCVE-2024-10386\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f\n\u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0628\u062e\u0634 \u0635\u0646\u0639\u062a\u06cc \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n- \u0645\u062d\u062f\u0648\u062f\u06cc\u062a \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a)\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN) \u0628\u0647 \u0628\u062e\u0634 \u0635\u0646\u0639\u062a\u06cc.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0633\u0637\u062d \u0628\u0631\u0646\u0627\u0645\u0647 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648\u0628 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u067e\u0644\u062a \u0641\u0631\u0645 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1708.html\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2024-11-08T19:52:48.000000Z"}, {"uuid": "4599eb05-71a9-49f1-9706-bbc608510a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10385", "type": "seen", "source": "https://t.me/cvedetector/13449", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10385 - DirectAdmin Evolution Skin Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-10385 \nPublished : Dec. 20, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : Ticket management system in DirectAdmin Evolution Skin is vulnerable to XSS (Cross-site Scripting), which allows a low-privileged user to inject and store malicious JavaScript code.  \nIf an admin views the ticket, the script might perform actions with their privileges, including command execution.\u00a0  \nThis issue has been fixed in\u00a0version 1.668 of DirectAdmin Evolution Skin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T18:25:30.000000Z"}, {"uuid": "619724e2-6449-4aba-a8d9-57510e4979f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10382", "type": "seen", "source": "https://t.me/cvedetector/11582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10382 - Android Jetpack Car App RCE Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10382 \nPublished : Nov. 20, 2024, 11:15 a.m. | 38\u00a0minutes ago \nDescription : There exists a code execution vulnerability in the Car App Android Jetpack Library. In the CarAppService desrialization logic is used that allows for arbitrary java classes to be constructed. In combination with other gadgets, this can lead to arbitrary code execution. An attacker needs to have an app on a victims Android device that uses the CarAppService Class and the victim would need to install a malicious app alongside it. We recommend upgrading the library past version\u00a01.7.0-beta02 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T12:54:06.000000Z"}, {"uuid": "b06e0d03-ec63-44c9-a5d2-a76cbe87d11f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10388", "type": "seen", "source": "https://t.me/cvedetector/11436", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10388 - WordPress GDPR Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10388 \nPublished : Nov. 19, 2024, 8:15 a.m. | 43\u00a0minutes ago \nDescription : The WordPress GDPR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gdpr_firstname' and 'gdpr_lastname' parameters in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T10:07:20.000000Z"}, {"uuid": "205dd062-f687-414e-93b7-475e7c76f6b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10389", "type": "seen", "source": "https://t.me/cvedetector/9721", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10389 - Safearchive Path Traversal(Vulnerability)\", \n  \"Content\": \"CVE ID : CVE-2024-10389 \nPublished : Nov. 4, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : There exists a Path Traversal vulnerability in Safearchive on Platforms with Case-Insensitive Filesystems (e.g., NTFS). This allows Attackers to Write Arbitrary Files via Archive Extraction containing symbolic links. We recommend upgrading past commit\u00a0f7ce9d7b6f9c6ecd72d0b0f16216b046e55e44dc \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T12:45:49.000000Z"}, {"uuid": "6ea62133-d3be-44bb-a36d-0b11c9e712c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10386", "type": "seen", "source": "https://t.me/cvedetector/8968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10386 - Sophos Database Manipulation Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-10386 \nPublished : Oct. 25, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : CVE-2024-10386 IMPACT  \n  \n  \n  \nAn authentication  \nvulnerability exists in the affected product. The vulnerability could allow a  \nthreat actor with network access to send crafted messages to the device, potentially  \nresulting in database manipulation. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T20:25:58.000000Z"}, {"uuid": "0be7abfc-2beb-4b56-879b-c8b85fb15975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10381", "type": "seen", "source": "https://t.me/cvedetector/8943", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10381 - Matrix Door Controller Cosec Vega FAXQ Web Session Management Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2024-10381 \nPublished : Oct. 25, 2024, 1:15 p.m. | 40\u00a0minutes ago \nDescription : This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device.  \n  \nSuccessful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T16:14:51.000000Z"}, {"uuid": "19f3207d-75ee-40d3-9a1a-70e827c7a545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10380", "type": "seen", "source": "https://t.me/cvedetector/8942", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10380 - SourceCodester Petrol Pump Management Software SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10380 \nPublished : Oct. 25, 2024, 1:15 p.m. | 40\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/ajax_product.php. The manipulation of the argument drop_services leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T16:14:51.000000Z"}, {"uuid": "d164a27d-56d5-48e4-9a54-32147952f9f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10387", "type": "seen", "source": "https://t.me/cvedetector/8957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10387 - Acrobat Reader Denial-of-Service\", \n  \"Content\": \"CVE ID : CVE-2024-10387 \nPublished : Oct. 25, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : CVE-2024-10387 IMPACT  \n  \n  \n  \nA Denial-of-Service  \nvulnerability exists in the affected product. The vulnerability could allow a  \nthreat actor with network access to send crafted messages to the device,  \npotentially resulting in Denial-of-Service. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T20:25:43.000000Z"}]}