{"uuid": "d503787f-cf8e-479b-ab80-451abbcdb6cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54448", "type": "seen", "source": "https://t.me/cvedetector/20336", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54448 - LogicalDOC Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2024-54448 \nPublished : March 14, 2025, 6:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack.\u00a0Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T20:53:45.000000Z"}