{"uuid": "1e87805c-0ca3-4051-9583-132c2b9b1604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51749", "type": "seen", "source": "https://t.me/cvedetector/10666", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51749 - Element Matrix File Download Vulnerability (Arbitrary File Upload)\", \n  \"Content\": \"CVE ID : CVE-2024-51749 \nPublished : Nov. 12, 2024, 5:15 p.m. | 33\u00a0minutes ago \nDescription : Element is a Matrix web client built using the Matrix React SDK. Versions of Element Web and Desktop earlier than 1.11.85 do not check if thumbnails for attachments, stickers and images are coherent. It is possible to add thumbnails to events trigger a file download once clicked. Fixed in element-web 1.11.85. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T18:53:50.000000Z"}