{"uuid": "4fb69560-fd87-4289-9ee0-e8c5778ed3de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45314", "type": "seen", "source": "https://t.me/cvedetector/4804", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45314 - Apache Flask-AppBuilder Sensitive Data Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45314 \nPublished : Sept. 4, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Flask-AppBuilder is an application development framework. Prior to version 4.5.1, the auth DB login form default cache directives allows browser to locally store sensitive data. This can be an issue on environments using shared computer resources. Version 4.5.1 contains a patch for this issue. If upgrading is not possible, configure one's web server to send the specific HTTP headers for `/login` per the directions provided in the GitHub Security Advisory. \nSeverity: 3.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T19:25:19.000000Z"}