{"uuid": "73681553-872d-4e1c-a8a0-937f6acd4f28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/cvedetector/10814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8001 - VIWIS LMS Print Handler Remote Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-8001 \nPublished : Nov. 13, 2024, 10:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T12:11:30.000000Z"}