{"uuid": "ac242795-c215-4ac6-8218-33ac93eead64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48761", "type": "seen", "source": "https://t.me/cvedetector/16724", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48761 - Celk Saude SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48761 \nPublished : Jan. 29, 2025, 10:15 p.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : The specific component in Celk Saude 3.1.252.1 that processes user input and returns error messages to the client is vulnerable due to improper validation or sanitization of the \"erro\" parameter. This parameter appears as a response when incorrect credentials are entered during login. The lack of proper validation or sanitization makes the component susceptible to injection attacks, potentially allowing attackers to manipulate the input and exploit the system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T01:43:34.000000Z"}