{"vulnerability": "CVE-2024-26310", "sightings": [{"uuid": "96aa272a-a94c-45e9-a664-249eb742d6c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26310", "type": "seen", "source": "https://t.me/ctinow/206556", "content": "https://ift.tt/cxONTnP\nCVE-2024-26310 | Archer Platform up to 6.14 P1 API access control", "creation_timestamp": "2024-03-13T11:11:32.000000Z"}, {"uuid": "2aed22aa-bea4-4987-8d3d-a63f355b1068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26310", "type": "seen", "source": "https://t.me/arpsyndicate/4073", "content": "#ExploitObserverAlert\n\nCVE-2024-26310\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26310. Archer Platform 6.8 before 6.14 P2 (6.14.0.2) contains an improper access control vulnerability. A remote authenticated malicious user could potentially exploit this to gain access to API information that should only be accessible with extra privileges.", "creation_timestamp": "2024-02-22T22:17:07.000000Z"}, {"uuid": "6feb390c-82e6-4262-b400-3528a9c7bcb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26310", "type": "seen", "source": "https://t.me/ctinow/190090", "content": "https://ift.tt/4tf3KEo\nCVE-2024-26310", "creation_timestamp": "2024-02-21T21:31:54.000000Z"}, {"uuid": "0bf9535d-c7aa-434c-8210-f5b8f91ba5b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26310", "type": "seen", "source": "https://t.me/ctinow/190100", "content": "https://ift.tt/4tf3KEo\nCVE-2024-26310", "creation_timestamp": "2024-02-21T21:36:36.000000Z"}]}