{"vulnerability": "CVE-2024-38879", "sightings": [{"uuid": "54965728-3e64-4e49-add3-d920585038bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38879", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/113473658534013466", "content": "", "creation_timestamp": "2024-11-13T04:03:41.776063Z"}, {"uuid": "5fdb4a4e-4dac-4270-9b48-708211928b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38879", "type": "seen", "source": "https://t.me/cvedetector/2349", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38879 - Omnivise T3000 Application Server Authentication Bypass Remote Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38879 \nPublished : Aug. 2, 2024, 11:16 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Omnivise\u00a0T3000 Application Server (All versions). The affected system exposes the port of an internal application on the public network interface allowing an attacker to circumvent authentication and directly access the exposed application. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-02T14:01:23.000000Z"}]}