{"vulnerability": "CVE-2024-8934", "sightings": [{"uuid": "e009457a-c57a-4dde-9bbe-10031973d642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8934", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-01", "content": "", "creation_timestamp": "2024-11-07T12:00:00.000000Z"}, {"uuid": "5007ad75-4527-4d98-9612-eda29fb171ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8934", "type": "seen", "source": "https://t.me/cvedetector/9502", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8934 - TwinCAT Arbitrary OS Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8934 \nPublished : Oct. 31, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T15:16:18.000000Z"}, {"uuid": "0ceee3ab-41d5-4c79-92d0-1dfd001c3aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8934", "type": "seen", "source": "Telegram/D2pvGkTuSuQoHjEgXF6_pNqwYJdL2ayIHlXfl1SpKeA_Cj8", "content": "", "creation_timestamp": "2024-11-11T13:31:49.000000Z"}]}