{"vulnerability": "CVE-2024-47530", "sightings": [{"uuid": "6db222e5-26e0-4e99-8458-e95bd5389b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47530", "type": "seen", "source": "https://t.me/cvedetector/6665", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47530 - \"Scout Web Visualizer Open Redirect and Downgrade Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-47530 \nPublished : Sept. 30, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T19:10:08.000000Z"}]}