{"uuid": "c2115a03-3e00-4022-ba94-01e0ee8fdb54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49745", "type": "seen", "source": "https://t.me/cvedetector/16053", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49745 - Apache Parcel Heap-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-49745 \nPublished : Jan. 21, 2025, 11:15 p.m. | 39\u00a0minutes ago \nDescription : In growData of Parcel.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T01:21:02.000000Z"}