{"uuid": "dd57f0e6-1771-4b1d-bcc0-c7fb4766740c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44117", "type": "seen", "source": "https://t.me/cvedetector/5172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44117 - Apache WebSense Unauthorized Functionality Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44117 \nPublished : Sept. 10, 2024, 5:15 a.m. | 15\u00a0minutes ago \nDescription : The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T07:32:32.000000Z"}