{"uuid": "24e405f9-61a4-4b8b-8f60-b2ed4ae82a8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10313", "type": "seen", "source": "https://t.me/cvedetector/8831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10313 - iniNet Solutions SpiderControl SCADA PC Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10313 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : iniNet Solutions SpiderControl SCADA PC HMI Editor has a path traversal   \nvulnerability. When the software loads a malicious \u2018ems' project   \ntemplate file constructed by an attacker, it can write files to   \narbitrary directories. This can lead to overwriting system files,   \ncausing system paralysis, or writing to startup items, resulting in   \nremote control. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:26.000000Z"}