{"vulnerability": "CVE-2024-5652", "sightings": [{"uuid": "57594d57-36fa-4ba1-a545-b30645158b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56520", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722915482289992", "content": "", "creation_timestamp": "2024-12-27T04:32:59.468875Z"}, {"uuid": "4a100437-4104-4d24-a4b5-3c43441348b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722915496819427", "content": "", "creation_timestamp": "2024-12-27T04:32:59.656568Z"}, {"uuid": "9b035fe2-fb3f-4aac-90a6-b0f25be0560a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56520", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722933150926251", "content": "", "creation_timestamp": "2024-12-27T04:37:29.112628Z"}, {"uuid": "39498320-bb82-4858-97ec-8b98f6738714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722933165201992", "content": "", "creation_timestamp": "2024-12-27T04:37:29.735089Z"}, {"uuid": "f77d3162-ac6a-460e-8725-a05256c57199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56522", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722992195416835", "content": "", "creation_timestamp": "2024-12-27T04:52:30.261344Z"}, {"uuid": "dc089025-e9ce-437e-a911-253b3c756f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56520", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lebaaxcvau22", "content": "", "creation_timestamp": "2024-12-27T05:15:41.970602Z"}, {"uuid": "100e8742-d29b-4ecc-9d27-aa80b993c365", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lebaazoj2u2m", "content": "", "creation_timestamp": "2024-12-27T05:15:44.596526Z"}, {"uuid": "1699af24-c15d-4647-9eb8-874af5b114a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56522", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lebab3wg6n2e", "content": "", "creation_timestamp": "2024-12-27T05:15:46.888536Z"}, {"uuid": "1708e9ba-8c6f-41c6-af39-61bbde103a7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56527", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113723216064255733", "content": "", "creation_timestamp": "2024-12-27T05:49:26.025092Z"}, {"uuid": "a4671d40-72c9-4c10-9d63-d2eda253b143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56527", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lebdmmtxt52m", "content": "", "creation_timestamp": "2024-12-27T06:15:54.857499Z"}, {"uuid": "2fc289c4-71a6-4b60-a92c-3754f7cf2ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113908366252655454", "content": "", "creation_timestamp": "2025-01-28T22:35:34.720820Z"}, {"uuid": "948f0da4-251a-4c1e-bb07-3f831d3f2795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtlj3xg6b2t", "content": "", "creation_timestamp": "2025-01-28T23:15:24.941261Z"}, {"uuid": "c0d03ab5-dec1-43ec-b637-c300adec7020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtyvj2pmd2i", "content": "", "creation_timestamp": "2025-01-29T03:15:00.873288Z"}, {"uuid": "8ba4c9b6-411f-4afa-959b-fa29ae9ea2f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "https://daniel.haxx.se/blog/2025/02/11/disabling-cert-checks-we-have-not-learned-much/", "content": "", "creation_timestamp": "2025-02-11T14:00:07.000000Z"}, {"uuid": "646c94d7-4bc9-496c-8973-dbecf4cd3573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56525", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lixujrpffj2q", "content": "", "creation_timestamp": "2025-02-25T02:57:56.089279Z"}, {"uuid": "03b2da24-e613-4325-9a5c-45946b587e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56525", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114065783674642517", "content": "", "creation_timestamp": "2025-02-25T17:48:52.895827Z"}, {"uuid": "fa1d6140-e994-4822-9f98-1d7ade11ecd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5652", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-306/", "content": "", "creation_timestamp": "2025-05-21T03:00:00.000000Z"}, {"uuid": "3956c2e6-029d-42a1-b4bb-9e7580882ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56528", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114276298770722682", "content": "", "creation_timestamp": "2025-04-03T22:05:38.966668Z"}, {"uuid": "469ce2ae-25ee-45df-a86e-b1481285a98d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56528", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114276298770722682", "content": "", "creation_timestamp": "2025-04-03T22:05:38.965620Z"}, {"uuid": "dd19a5e5-1ac9-4210-856a-e6726b9a4648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56528", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxact7qmn2w", "content": "", "creation_timestamp": "2025-04-04T01:11:43.001448Z"}, {"uuid": "2e17aeb1-e57d-4d9c-b135-1f51859d61fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56525", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lj234av2so2j", "content": "", "creation_timestamp": "2025-02-26T00:00:57.254920Z"}, {"uuid": "8864ba5d-01cb-479e-b420-3e929cee4146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56523", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114495674653335932", "content": "", "creation_timestamp": "2025-05-12T15:55:48.721383Z"}, {"uuid": "82f86998-631b-4327-98a9-e610704d037b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56523", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lomxjktb622g", "content": "", "creation_timestamp": "2025-05-08T03:23:21.649177Z"}, {"uuid": "46b9c9a9-bf51-4fb2-b9bb-862f5d1436c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56524", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lomxjktb622g", "content": "", "creation_timestamp": "2025-05-08T03:23:21.774251Z"}, {"uuid": "4107b94c-1f62-4dc2-a054-44647d4f3b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56524", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114495674653335932", "content": "", "creation_timestamp": "2025-05-12T15:55:48.784661Z"}, {"uuid": "2cdfe20d-21c4-4834-b8d4-d705c5722f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56523", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lozb4s4qne2p", "content": "", "creation_timestamp": "2025-05-13T00:47:08.264569Z"}, {"uuid": "97ae74db-60c0-4227-ac4e-4fc6bde9ecb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56524", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lozb4s7xhj2p", "content": "", "creation_timestamp": "2025-05-13T00:47:08.839340Z"}, {"uuid": "99be8822-fa98-4457-abce-b2f7167a0c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56525", "type": "seen", "source": "https://t.me/cvedetector/18845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56525 - Public Knowledge Project OJS/OMP/OPS XML Injection and Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-56525 \nPublished : Feb. 24, 2025, 11:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : In Public Knowledge Project (PKP) OJS, OMP, and OPS before 3.3.0.21 and 3.4.x before 3.4.0.8, an XXE attack by the Journal Editor Role can create a new role as super admin in the journal context, and insert a backdoor plugin, by uploading a crafted XML document as a User XML Plugin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T02:19:32.000000Z"}, {"uuid": "1c68eef4-197b-4e8b-b336-bc04c7b78d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56526", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2wssz7fk2h", "content": "", "creation_timestamp": "2025-05-13T16:47:56.042784Z"}, {"uuid": "28f86415-033f-4cb3-aff6-2e6c74165ad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:19.000000Z"}, {"uuid": "a6ff3049-f706-4ab8-8404-9ad043ad1567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/26561a4f-d892-4f81-a2d1-231d4980d359", "content": "", "creation_timestamp": "2025-02-12T06:35:44.808978Z"}, {"uuid": "2ad9f5c8-5aa5-485d-b4cd-903ed7e94e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56524", "type": "seen", "source": "https://t.me/cvedetector/25089", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56524 - Radware Cloud Web Application Firewall (WAF) URL Filter Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56524 \nPublished : May 12, 2025, 3:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Radware Cloud Web Application Firewall (WAF) before 2025-05-07 allows remote attackers to bypass firewall filters by adding a special character to the request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T18:37:21.000000Z"}, {"uuid": "7f93df93-d610-431a-a4de-11cb4b3aced4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3331", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56529\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mailcow through 2024-11b has a session fixation vulnerability in the web panel. It allows remote attackers to set a session identifier when HSTS is disabled on a victim's browser. After a user logs in, they are authenticated and the session identifier is valid. Then, a remote attacker can access the victim's web panel with the same session identifier.\n\ud83d\udccf Published: 2025-01-29T00:31:54Z\n\ud83d\udccf Modified: 2025-01-29T00:31:54Z\n\ud83d\udd17 References:\n1. https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-23c8-4wwr-g3c6\n2. https://nvd.nist.gov/vuln/detail/CVE-2024-56529", "creation_timestamp": "2025-01-29T01:10:14.000000Z"}, {"uuid": "4384be9f-4e38-4b5b-84d3-0edb61cfacfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56525", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56525\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Public Knowledge Project (PKP) OJS, OMP, and OPS before 3.3.0.21 and 3.4.x before 3.4.0.8, an XXE attack by the Journal Editor Role can create a new role as super admin in the journal context, and insert a backdoor plugin, by uploading a crafted XML document as a User XML Plugin.\n\ud83d\udccf Published: 2025-02-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-24T22:51:31.123Z\n\ud83d\udd17 References:\n1. https://openjournaltheme.com/user-xml-fatal-vulnerabilities-for-ojs-omp-ops-3-3-0-21-cve-2024-56525/", "creation_timestamp": "2025-02-24T23:27:56.000000Z"}, {"uuid": "e1835730-0320-48c7-b5cf-c58108df3f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5652", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8092", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5652\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: In Docker Desktop on Windows before v4.31.0\u00a0allows a user in the docker-users\u00a0group to cause a Windows Denial-of-Service through the exec-path\u00a0Docker daemon config option in Windows containers mode.\n\ud83d\udccf Published: 2024-07-09T17:07:08.691Z\n\ud83d\udccf Modified: 2025-03-19T15:47:03.640Z\n\ud83d\udd17 References:\n1. https://docs.docker.com/desktop/release-notes/#4310", "creation_timestamp": "2025-03-19T16:18:17.000000Z"}, {"uuid": "6c2e0bac-03e4-4171-b9c7-e671480bddba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56528", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10337", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56528\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This vulnerability affects Snowplow Collector 3.x before 3.3.0 (unless it\u2019s set up behind a reverse proxy that establishes payload limits). It involves sending very large payloads to the Collector and can render it unresponsive to the rest of the requests. As a result, data would not enter the pipeline and would be potentially lost.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-03T20:31:08.274Z\n\ud83d\udd17 References:\n1. https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", "creation_timestamp": "2025-04-03T20:35:40.000000Z"}, {"uuid": "7559066a-2b17-4c70-800e-1fa0b7ff574c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56524", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16056", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56524\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Radware Cloud Web Application Firewall (WAF) before 2025-05-07 allows remote attackers to bypass firewall filters by adding a special character to the request.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T22:07:28.750Z\n\ud83d\udd17 References:\n1. https://radware.com/solutions/cloud-security/\n2. https://www.kb.cert.org/vuls/id/722229", "creation_timestamp": "2025-05-12T22:29:06.000000Z"}, {"uuid": "1af5bcd8-2ded-41d4-8b72-9d8c7fb5e7f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56523", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16055", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56523\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Radware Cloud Web Application Firewall (WAF) before 2025-05-07 allows remote attackers to bypass firewall filters by placing random data in the HTTP request body when using the HTTP GET method.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T22:07:33.935Z\n\ud83d\udd17 References:\n1. https://radware.com/solutions/cloud-security/\n2. https://www.kb.cert.org/vuls/id/722229", "creation_timestamp": "2025-05-12T22:29:05.000000Z"}, {"uuid": "e5da7295-1fa3-4e05-ab60-8c3af2e44434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56523", "type": "seen", "source": "https://t.me/cvedetector/25088", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56523 - Radware Cloud Web Application Firewall (WAF) HTTP Request Smuggling\", \n  \"Content\": \"CVE ID : CVE-2024-56523 \nPublished : May 12, 2025, 3:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Radware Cloud Web Application Firewall (WAF) before 2025-05-07 allows remote attackers to bypass firewall filters by placing random data in the HTTP request body when using the HTTP GET method. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T18:37:21.000000Z"}, {"uuid": "daa531a7-6624-46b6-a81b-633e8bb48700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "https://t.me/cvedetector/13714", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56521 - TCPDF SSL Verification Bypass Vulewolf\", \n  \"Content\": \"CVE ID : CVE-2024-56521 \nPublished : Dec. 27, 2024, 5:15 a.m. | 26\u00a0minutes ago \nDescription : An issue was discovered in TCPDF before 6.8.0. If libcurl is used, CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are set unsafely. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T06:47:24.000000Z"}, {"uuid": "decb2784-f5f8-4771-bd9e-088371d60225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56528", "type": "seen", "source": "https://t.me/cvedetector/22044", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56528 - Snowplow Collector Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-56528 \nPublished : April 3, 2025, 9:15 p.m. | 2\u00a0hours, 9\u00a0minutes ago \nDescription : This vulnerability affects Snowplow Collector 3.x before 3.3.0 (unless it\u2019s set up behind a reverse proxy that establishes payload limits). It involves sending very large payloads to the Collector and can render it unresponsive to the rest of the requests. As a result, data would not enter the pipeline and would be potentially lost. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T02:07:04.000000Z"}, {"uuid": "415500db-5515-40b8-b1d6-513cf6907dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56521", "type": "seen", "source": "Telegram/HtFOs7UqBi7ckxvaXLHIVvl7UehkpVnRSDNa7Djm_76Q4Sfl", "content": "", "creation_timestamp": "2025-02-18T23:42:23.000000Z"}, {"uuid": "f878196f-b69e-468a-a915-c5ef12988917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56522", "type": "seen", "source": "https://t.me/cvedetector/13709", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56522 - TCPDF PHP Timing Attack\", \n  \"Content\": \"CVE ID : CVE-2024-56522 \nPublished : Dec. 27, 2024, 5:15 a.m. | 26\u00a0minutes ago \nDescription : An issue was discovered in TCPDF before 6.8.0. unserializeTCPDFtag uses != (aka loose comparison) and does not use a constant-time function to compare TCPDF tag hashes. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T06:47:18.000000Z"}, {"uuid": "7b9819b2-ac6a-4c46-9ae3-6262cd77ceaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56526", "type": "seen", "source": "https://t.me/cvedetector/25211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56526 - OXID eShop Smarty Template Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56526 \nPublished : May 13, 2025, 4:15 p.m. | 59\u00a0minutes ago \nDescription : An issue was discovered in OXID eShop before 7. CMS pages in combination with Smarty may display user information if a CMS page contains a Smarty syntax error. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T19:43:55.000000Z"}, {"uuid": "63f8f1a3-bfc7-4efe-bbdd-873a7787dfee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "seen", "source": "https://t.me/cvedetector/16648", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56529 - Mailcow Session Fixation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56529 \nPublished : Jan. 28, 2025, 11:15 p.m. | 26\u00a0minutes ago \nDescription : Mailcow through 2024-11b has a session fixation vulnerability in the web panel. It allows remote attackers to set a session identifier when HSTS is disabled on a victim's browser. After a user logs in, they are authenticated and the session identifier is valid. Then, a remote attacker can access the victim's web panel with the same session identifier. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T01:28:58.000000Z"}, {"uuid": "35a8cf43-1b49-4c22-884e-95a2146011f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56520", "type": "seen", "source": "https://t.me/cvedetector/13713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56520 - TCPDF Font Parsing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56520 \nPublished : Dec. 27, 2024, 5:15 a.m. | 26\u00a0minutes ago \nDescription : An issue was discovered in tc-lib-pdf-font before 2.6.4, as used in TCPDF before 6.8.0 and other products. Fonts are mishandled, e.g., FontBBox for Type 1 and TrueType fonts is misparsed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T06:47:21.000000Z"}, {"uuid": "c953b6f0-3830-4442-bc9e-601a9b984b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5652", "type": "seen", "source": "https://t.me/cvedetector/386", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5652 - In Docker Desktop on Windows before v4.31.0\u00a0allows\", \n  \"Content\": \"CVE ID : CVE-2024-5652 \nPublished : July 9, 2024, 5:15 p.m. | 27\u00a0minutes ago \nDescription : In Docker Desktop on Windows before v4.31.0\u00a0allows a user in the docker-users\u00a0group to cause a Windows Denial-of-Service through the exec-path\u00a0Docker daemon config option in Windows containers mode. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T19:48:19.000000Z"}, {"uuid": "0fccff54-d6af-4022-8c77-c5fa72c313b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56527", "type": "seen", "source": "https://t.me/cvedetector/13721", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56527 - TCPDF Unvalidated Error Message Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56527 \nPublished : Dec. 27, 2024, 6:15 a.m. | 15\u00a0minutes ago \nDescription : An issue was discovered in TCPDF before 6.8.0. The Error function lacks an htmlspecialchars call for the error message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T07:37:41.000000Z"}, {"uuid": "a51211ac-0107-4792-9e6c-7dfd7e7df6dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56529", "type": "seen", "source": "https://t.me/suboxone_chatroom/7394", "content": "CVE-2024-56529: Session Fixation in Mailcow, 7.5 rating\u2757\ufe0f\n\nThe application does not disable old session IDs, which allows a remote attacker to use existing IDs in the victim's browser.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/AuyJw\n\ud83d\udc49 Dork: http.title:\"mailcow UI\"\n\nVendor's advisory: https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-23c8-4wwr-g3c6", "creation_timestamp": "2025-04-01T12:36:32.000000Z"}]}