{"uuid": "f718338e-b909-4656-a6e8-e8e2be632d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4996", "type": "seen", "source": "https://t.me/cvedetector/13194", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4996 - Wapro ERP Hard-Coded Database Administrator Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4996 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : Use of a hard-coded password for a database administrator account created during Wapro ERP\u00a0installation allows an attacker to retrieve embedded sensitive data stored in the database. The password is same among all Wapro ERP\u00a0installations.\u00a0This issue affects Wapro ERP Desktop versions before 8.90.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:49.000000Z"}