{"uuid": "2bc37ddf-6ca5-4f3a-b91c-8d0440c75fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10524", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8396", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10524\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.\n\ud83d\udccf Published: 2024-11-19T14:23:09.718Z\n\ud83d\udccf Modified: 2025-03-21T18:03:44.339Z\n\ud83d\udd17 References:\n1. https://seclists.org/oss-sec/2024/q4/107\n2. https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/\n3. https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778", "creation_timestamp": "2025-03-21T18:19:58.000000Z"}