{"vulnerability": "CVE-2024-52612", "sightings": [{"uuid": "cb0e678d-71aa-4216-95e9-1f25359b3f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984069914875660", "content": "", "creation_timestamp": "2025-02-11T07:27:59.955245Z"}, {"uuid": "240d07d8-b31e-4fb2-803f-0a1e37aa363c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhv7rt6hlm22", "content": "", "creation_timestamp": "2025-02-11T08:16:03.982824Z"}, {"uuid": "c1d6b095-abe1-4093-99eb-9dffc0caa166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvnfvv3kw2b", "content": "", "creation_timestamp": "2025-02-11T12:19:58.545528Z"}, {"uuid": "fa9b63b3-3660-4ad5-bc63-7d11aae864c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://t.me/cvedetector/17679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52612 - SolarWinds Platform Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-52612 \nPublished : Feb. 11, 2025, 8:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T11:29:54.000000Z"}, {"uuid": "060b33f7-600e-4464-980e-a16edb77fcab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3972", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52612\n\ud83d\udd25 CVSS Score: 6.8 (CVSS_V3)\n\ud83d\udd39 Description: SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable.\n\ud83d\udccf Published: 2025-02-11T09:30:33Z\n\ud83d\udccf Modified: 2025-02-12T00:32:16Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-52612\n2. https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm\n3. https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52612", "creation_timestamp": "2025-02-12T01:11:12.000000Z"}, {"uuid": "c5887968-cebd-48f0-b7d1-658e3fcb257d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4776", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52612\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable.\n\ud83d\udccf Published: 2025-02-11T07:21:17.835Z\n\ud83d\udccf Modified: 2025-02-19T04:55:13.422Z\n\ud83d\udd17 References:\n1. https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm\n2. https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52612", "creation_timestamp": "2025-02-19T08:39:13.000000Z"}]}