{"uuid": "545786fc-2ce5-425a-9354-ab2328364018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55653", "type": "seen", "source": "https://t.me/cvedetector/12612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55653 - PwnDoc Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-55653 \nPublished : Dec. 10, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T01:01:35.000000Z"}