{"uuid": "7eaa0b7a-1883-42bb-90a1-8b2676a105fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47561", "type": "seen", "source": "https://t.me/cvedetector/6892", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47561 - Apache Avro Java SDK Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47561 \nPublished : Oct. 3, 2024, 11:15 a.m. | 42\u00a0minutes ago \nDescription : Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code.  \nUsers are recommended to upgrade to version 1.11.4\u00a0 or 1.12.0, which fix this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T14:06:25.000000Z"}