{"vulnerability": "CVE-2024-55888", "sightings": [{"uuid": "a9b800ee-d43d-4de8-8a52-faea3681b5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55888", "type": "seen", "source": "https://t.me/cvedetector/12809", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55888 - Hush Line XSS (Miscconfigured Server)\", \n  \"Content\": \"CVE ID : CVE-2024-55888 \nPublished : Dec. 12, 2024, 8:15 p.m. | 42\u00a0minutes ago \nDescription : Hush Line is an open-source whistleblower management system. Starting in version 0.1.0 and prior to version 0.3.5, the productions server appeared to have been misconfigured and missed providing any content security policy or security headers. This could result in bypassing of cross-site scripting filters. Version 0.3.5 fixed the issue. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T22:12:11.000000Z"}, {"uuid": "5b8a08ef-8642-44b2-b9cd-cd9155d13fc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55888", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113641528492308277", "content": "", "creation_timestamp": "2024-12-12T19:35:12.445400Z"}]}