{"vulnerability": "CVE-2024-52270", "sightings": [{"uuid": "980ac85e-e6ce-4817-bd56-ae1241054b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52270", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113599866140066001", "content": "", "creation_timestamp": "2024-12-05T10:59:55.464042Z"}, {"uuid": "4645aac5-0c34-46fb-b35d-42ad2a76af26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52270", "type": "seen", "source": "https://t.me/cvedetector/12077", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52270 - User Interface (UI) Misrepresentation of Critical\", \n  \"Content\": \"CVE ID : CVE-2024-52270 \nPublished : Dec. 5, 2024, 11:15 a.m. | 58\u00a0minutes ago \nDescription : User Interface (UI) Misrepresentation of Critical Information vulnerability in DropBox Sign(HelloSign) allows Content Spoofing.  \nDisplayed version does not show the layer flattened version, once download, If printed (e.g. via Google Chrome -&gt; Examine the print preview): Will render the vulnerability only, not all layers are flattened.  \nThis issue affects DropBox Sign(HelloSign): through 2024-12-04. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T13:40:51.000000Z"}]}