{"uuid": "8de31e7e-e1cf-41f7-aac7-ee46b66b8b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4227", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1707", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4227\n\ud83d\udd39 Description: In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.\n\ud83d\udccf Published: 2025-01-15T08:00:24.578Z\n\ud83d\udccf Modified: 2025-01-15T08:00:24.578Z\n\ud83d\udd17 References:\n1. https://sourceforge.net/p/gsoap2/code/HEAD/tree/changelog.md\n2. https://www.genivia.com/advisory.html#Upgrade_recommendation_when_option_-c++11_is_used_to_generate_C++11_source_code", "creation_timestamp": "2025-01-15T08:27:49.000000Z"}