{"uuid": "96c8741e-8815-4556-9151-627179917d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54852", "type": "seen", "source": "https://t.me/cvedetector/16720", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54852 - Teedy LDAP Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54852 \nPublished : Jan. 29, 2025, 10:15 p.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an unauthenticated attacker is then able to perform various malicious actions, such as creating arbitrary accounts and spraying passwords. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T01:43:28.000000Z"}