{"vulnerability": "CVE-2024-38878", "sightings": [{"uuid": "3338d3a4-f450-4786-b910-9a366ee2556a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38878", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/113473658534013466", "content": "", "creation_timestamp": "2024-11-13T04:03:41.756306Z"}, {"uuid": "6462afc1-2fd6-4f2c-bc01-5b3d4cd9bd53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38878", "type": "seen", "source": "https://t.me/cvedetector/2348", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38878 - Omnivise T3000 Application Server Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38878 \nPublished : Aug. 2, 2024, 11:16 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Omnivise\u00a0T3000 Application Server (All versions). Affected devices allow authenticated users to export diagnostics data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download arbitrary files from the file system. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-02T14:01:22.000000Z"}]}