{"vulnerability": "CVE-2024-45720", "sightings": [{"uuid": "6a536437-a91f-42a7-afe2-c780e72a4513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-45720", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "4e735aca-b58a-4866-9b0e-7403a7eaafdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45720", "type": "seen", "source": "https://t.me/cvedetector/7463", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45720 - Subversion Windows Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45720 \nPublished : Oct. 9, 2024, 1:15 p.m. | 16\u00a0minutes ago \nDescription : On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.  \n  \nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.  \n  \nSubversion is not affected on UNIX-like platforms. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T15:38:50.000000Z"}, {"uuid": "87b43e4b-5ca8-4969-9bdf-cffee62b7976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45720", "type": "seen", "source": "https://t.me/CyberBulletin/1147", "content": "\u26a1\ufe0fCVE-2024-45720: Code Execution Flaw Discovered in Apache Subversion for Windows.\n\n#CyberBulletin", "creation_timestamp": "2024-10-10T11:33:46.000000Z"}, {"uuid": "aecf0e7f-b550-4d58-8d71-99a3962e110e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45720", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15672", "content": "\u200aCVE-2024-45720: Code Execution Flaw Discovered in Apache Subversion for Windows\n\nhttps://securityonline.info/cve-2024-45720-code-execution-flaw-discovered-in-apache-subversion-for-windows/", "creation_timestamp": "2024-10-10T09:20:30.000000Z"}, {"uuid": "9c635258-c8b9-4776-82c8-034642a235de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45720", "type": "seen", "source": "https://t.me/CyberBulletin/26061", "content": "\u26a1\ufe0fCVE-2024-45720: Code Execution Flaw Discovered in Apache Subversion for Windows.\n\n#CyberBulletin", "creation_timestamp": "2024-10-10T11:33:46.000000Z"}]}