{"vulnerability": "CVE-2024-20400", "sightings": [{"uuid": "bcafd529-00f4-4b76-be17-dbcbede2659a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20400", "type": "seen", "source": "https://t.me/cvedetector/1106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20400 - Cisco Expressway Series HTTP Request Parameter Manipulation Remote Web Attack\", \n  \"Content\": \"CVE ID : CVE-2024-20400 \nPublished : July 17, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.  \n  \n This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page.  \n  \n Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T19:53:50.000000Z"}]}