{"uuid": "33305eb7-574a-4ab4-b269-4ca6b3bd58c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57727", "type": "seen", "source": "https://t.me/cvedetector/15549", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57727 - SimpleHelp Remote Support Software Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57727 \nPublished : Jan. 15, 2025, 11:15 p.m. | 45\u00a0minutes ago \nDescription : SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T01:10:45.000000Z"}