{"uuid": "60daeb7f-e454-49d5-a8db-adbce32dcd0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24961", "type": "seen", "source": "https://t.me/cvedetector/17132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24961 - Amazon S3Proxy Local File Exposure Remote File System Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-24961 \nPublished : Feb. 3, 2025, 9:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T23:40:58.000000Z"}