{"vulnerability": "CVE-2024-20444", "sightings": [{"uuid": "ed44e9e8-7d6e-42ea-91e5-fbdd075c70b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20444", "type": "seen", "source": "https://t.me/cvedetector/6861", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20444 - Cisco Nexus Dashboard Fabric Controller Cisco Data Center Network Manager Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-20444 \nPublished : Oct. 2, 2024, 5:15 p.m. | 23\u00a0minutes ago \nDescription : A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.  \n\u00a0  \nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-02T19:42:50.000000Z"}]}