{"vulnerability": "CVE-2024-47582", "sightings": [{"uuid": "70b5197a-035b-483b-bd1d-ebd518ec8103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47582", "type": "seen", "source": "https://t.me/cvedetector/12463", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47582 - Apache XML XXE Injection\", \n  \"Content\": \"CVE ID : CVE-2024-47582 \nPublished : Dec. 10, 2024, 1:15 a.m. | 42\u00a0minutes ago \nDescription : Due to missing validation of XML input, an unauthenticated attacker could send malicious input to an endpoint which leads to XML Entity Expansion attack. This causes limited impact on availability of the application. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T03:15:37.000000Z"}, {"uuid": "91c1a38c-6a89-49df-a9ab-e565aba7629c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47582", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113625782230765278", "content": "", "creation_timestamp": "2024-12-10T00:50:43.859813Z"}]}