{"uuid": "bf776f2a-fd04-4f40-9e27-dc39465e78a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54448", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54448\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack.\u00a0Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.\n\ud83d\udccf Published: 2025-03-14T18:01:25.311Z\n\ud83d\udccf Modified: 2025-03-18T16:36:58.362Z\n\ud83d\udd17 References:\n1. https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html", "creation_timestamp": "2025-03-18T16:51:14.000000Z"}