{"vulnerability": "cve-2024-48939", "sightings": [{"uuid": "9ca9fb39-965b-408a-95a1-d4f0d924006b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48939", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113461529914411224", "content": "", "creation_timestamp": "2024-11-11T00:39:12.118157Z"}, {"uuid": "0f39cc11-f976-4bbe-a7aa-686b9f51ee21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48939", "type": "seen", "source": "https://t.me/cvedetector/10450", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48939 - Paxton Net2 Unvalidated License File Processing Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48939 \nPublished : Nov. 11, 2024, 1:15 a.m. | 17\u00a0minutes ago \nDescription : Insufficient validation performed on the REST API License file in Paxton Net2 before 6.07.14023.5015 (SR4) enables use of the REST API with an invalid License File. Attackers may be able to retrieve access-log data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T02:43:04.000000Z"}]}