{"uuid": "adc4153e-cec5-4c6a-bf58-6f88c1e4dd61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10963", "type": "seen", "source": "https://t.me/cvedetector/10096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10963 - \"Apache pam_access Hostname Spoofing Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10963 \nPublished : Nov. 7, 2024, 4:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T17:46:19.000000Z"}