{"uuid": "3fbe7ee2-9843-4dc7-be44-d7d17d1a3a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12019", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7932", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12019\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with \u2018read\u2019 and \u2018download\u2019 privileges on at least one existing document in the application is required to exploit the vulnerability.\u00a0Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application.\n\ud83d\udccf Published: 2025-03-14T18:07:01.253Z\n\ud83d\udccf Modified: 2025-03-18T16:26:57.725Z\n\ud83d\udd17 References:\n1. https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html", "creation_timestamp": "2025-03-18T16:51:24.000000Z"}