{"uuid": "302bc1d0-d71a-44d1-8c06-03625836ca27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47256", "type": "seen", "source": "https://t.me/cvedetector/17422", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47256 - 2N Access Commander AES Passphrase Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47256 \nPublished : Feb. 6, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T21:55:28.000000Z"}