{"uuid": "14a360a4-6b2b-4a7d-8106-0f2778a8de93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47580", "type": "seen", "source": "https://t.me/cvedetector/12469", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47580 - Apache PDF File Read Consortium\", \n  \"Content\": \"CVE ID : CVE-2024-47580 \nPublished : Dec. 10, 2024, 1:15 a.m. | 42\u00a0minutes ago \nDescription : An attacker authenticated as an administrator can use an exposed webservice to create a PDF with an embedded attachment.  By specifying the file to be an internal server file and subsequently downloading the generated PDF, the attacker can read any file on the server with no effect on integrity or availability. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T03:15:44.000000Z"}