{"uuid": "3ed94636-aa1c-483f-be5e-b603c22b0a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10524", "type": "seen", "source": "https://t.me/cvedetector/11453", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10524 - Apache Wget Credentials Arp Spoofing\", \n  \"Content\": \"CVE ID : CVE-2024-10524 \nPublished : Nov. 19, 2024, 3:15 p.m. | 25\u00a0minutes ago \nDescription : Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T16:48:32.000000Z"}