{"vulnerability": "CVE-2024-4301", "sightings": [{"uuid": "4bdca1bf-41ec-4359-8100-a47a59635780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43011", "type": "seen", "source": "https://t.me/cvedetector/3370", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43011 - ZZCMS Arbitrary File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43011 \nPublished : Aug. 16, 2024, 8:15 p.m. | 36\u00a0minutes ago \nDescription : An arbitrary file deletion vulnerability exists in the admin/del.php file at line 62 in ZZCMS 2023 and earlier. Due to insufficient validation and sanitization of user input for file paths, an attacker can exploit this vulnerability by using directory traversal techniques to delete arbitrary files on the server. This can lead to the deletion of critical files, potentially disrupting the normal operation of the system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T22:55:23.000000Z"}]}