{"vulnerability": "CVE-2024-13009", "sightings": [{"uuid": "58b4e8c7-d7b9-4f7f-8835-6b603bdc23b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15583", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13009\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request\nbody. This can result in corrupted and/or inadvertent sharing of data between requests.\n\ud83d\udccf Published: 2025-05-08T17:29:31.380Z\n\ud83d\udccf Modified: 2025-05-08T17:29:31.380Z\n\ud83d\udd17 References:\n1. https://gitlab.eclipse.org/security/cve-assignement/-/issues/48\n2. https://github.com/jetty/jetty.project/security/advisories/GHSA-q4rv-gq96-w7c5", "creation_timestamp": "2025-05-08T18:24:29.000000Z"}, {"uuid": "ca60e6c7-304c-4a8a-a241-2c520bdd71a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/113", "content": "", "creation_timestamp": "2025-05-09T07:39:10.000000Z"}, {"uuid": "b99de6d9-f9ab-4f1c-9e0d-037bdcf55553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3loqgnz63bx2j", "content": "", "creation_timestamp": "2025-05-09T12:32:14.989738Z"}, {"uuid": "0f652d8d-0741-4f0c-ac11-2f725ace37b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeux6e4m24", "content": "", "creation_timestamp": "2025-09-30T01:31:29.240025Z"}, {"uuid": "9ebef525-c121-4d10-b419-a59fa9e064df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3maejvlprok2h", "content": "", "creation_timestamp": "2025-12-19T20:31:49.512347Z"}, {"uuid": "d252000e-fa37-4f46-bfcf-3bee3ed3157e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/43ff9e04-da8f-45fe-a06a-e8f9b84a2d14", "content": "", "creation_timestamp": "2025-09-11T13:37:23.512990Z"}, {"uuid": "1ae28f55-0d22-4fc0-b9df-0063221589a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "04e63097-f5c2-47f0-8a4b-4354807780fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looipib42pd2", "content": "", "creation_timestamp": "2025-05-08T19:43:10.375207Z"}, {"uuid": "da0c8182-0ba7-40ed-88f2-72cc7e8c7401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://t.me/cvedetector/24852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13009 - Eclipse Jetty Gzip Buffer Release Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13009 \nPublished : May 8, 2025, 6:15 p.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request  \nbody. This can result in corrupted and/or inadvertent sharing of data between requests. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T21:48:21.000000Z"}, {"uuid": "da32e17c-7ca1-44a0-bcbb-665c2bd6082f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m326cbqdaj24", "content": "", "creation_timestamp": "2025-10-13T02:31:30.883349Z"}]}