{"vulnerability": "CVE-2024-45595", "sightings": [{"uuid": "18ab3b4b-6acf-4448-b250-cff3b281afe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45595", "type": "seen", "source": "https://t.me/cvedetector/5260", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45595 - D-Tale Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45595 \nPublished : Sept. 10, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : D-Tale is a visualizer for Pandas data structures. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. Users should upgrade to version 3.14.1 where the \"Custom Filter\" input is turned off by default. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T19:15:38.000000Z"}]}