{"vulnerability": "CVE-2024-47554", "sightings": [{"uuid": "e8d41ead-4b93-4497-bf7f-87a4f86ee975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mcx3j6ayro2o", "content": "", "creation_timestamp": "2026-01-21T16:25:12.771214Z"}, {"uuid": "e22c2bb3-0289-4a11-8dcc-2fa92b6447de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "229c1f31-7590-4a85-8093-9f695b7f153c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "published-proof-of-concept", "source": "Telegram/kGaS8pU6npBl2aNcoQ81lKVUDEIfYGVLNjbwFXeAAPh3QQk", "content": "", "creation_timestamp": "2025-12-24T03:00:07.000000Z"}, {"uuid": "4b28c5d8-7a91-42ea-add8-57057c7358d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "seen", "source": "https://t.me/cvedetector/6894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47554 - Apache Commons IO CPU Exhaustion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47554 \nPublished : Oct. 3, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Uncontrolled Resource Consumption vulnerability in Apache Commons IO.  \n  \nThe org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.  \n  \n  \nThis issue affects Apache Commons IO: from 2.0 before 2.14.0.  \n  \nUsers are recommended to upgrade to version 2.14.0 or later, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T14:56:37.000000Z"}, {"uuid": "ea64a12e-14fa-4a05-88ba-76dd39de1b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeux6e4m24", "content": "", "creation_timestamp": "2025-09-30T01:31:29.044195Z"}, {"uuid": "23d4a53c-f1ba-4d67-8e50-af63e85ea351", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeuwaoi422", "content": "", "creation_timestamp": "2025-09-30T01:31:25.071764Z"}, {"uuid": "16069a47-901d-41a6-9cdd-5ef53515b30a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47554", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m326cbqdaj24", "content": "", "creation_timestamp": "2025-10-13T02:31:30.751230Z"}]}