{"vulnerability": "CVE-2024-39600", "sightings": [{"uuid": "31177e3c-d7cc-4c22-8999-1cfb0c5ea6fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39600", "type": "seen", "source": "https://t.me/cvedetector/241", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39600 - Under certain conditions, the memory of SAP GUI fo\", \n  \"Content\": \"CVE ID : CVE-2024-39600 \nPublished : July 9, 2024, 5:15 a.m. | 19\u00a0minutes ago \nDescription : Under certain conditions, the memory of SAP GUI  \nfor Windows contains the password used to log on to an SAP system, which might  \nallow an attacker to get hold of the password and impersonate the affected  \nuser. As a result, it has a high impact on the confidentiality but there is no  \nimpact on the integrity and availability. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T07:38:26.000000Z"}]}