{"vulnerability": "CVE-2024-5594", "sightings": [{"uuid": "145ee2a5-937f-4607-ad86-6a0153b8dec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55949", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113664290630673496", "content": "", "creation_timestamp": "2024-12-16T20:03:55.107914Z"}, {"uuid": "6e4fc564-ef63-4b62-b02a-a6176c3a7b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113782669176936995", "content": "", "creation_timestamp": "2025-01-06T17:49:09.247111Z"}, {"uuid": "c13bb78e-aa5c-4aba-a9a7-db6c4a63597b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113781746778966575", "content": "", "creation_timestamp": "2025-01-06T13:54:33.722617Z"}, {"uuid": "1bb47ae0-07f6-4a02-97e2-bf69e47b133c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3d3cxdlu2i", "content": "", "creation_timestamp": "2025-01-06T14:15:27.521102Z"}, {"uuid": "93f0a768-5165-4bd3-bd18-5c53fab3c5ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3f6yejhn2h", "content": "", "creation_timestamp": "2025-01-06T14:53:18.027408Z"}, {"uuid": "e0f6cd04-8daf-468d-9d9e-fb1c5e659135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55948", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947671170575758", "content": "", "creation_timestamp": "2025-02-04T21:11:19.012026Z"}, {"uuid": "61d3f6f8-9cd9-44c9-bf4c-2799bc07ab87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:38.999410Z"}, {"uuid": "5e65e7a6-94cd-4d11-882e-a6d36675219b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:49.010041Z"}, {"uuid": "2365e57e-d365-4484-b949-23fa1e3f60e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mbir4au5js2q", "content": "", "creation_timestamp": "2026-01-03T06:16:34.505021Z"}, {"uuid": "97b1b595-36da-458a-bc9b-c257b4608809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://gist.github.com/alon710/e50415c28c2ccb8c041fab0a085c5d6b", "content": "", "creation_timestamp": "2026-01-24T22:33:05.000000Z"}, {"uuid": "114c8634-5b6b-4cdc-8a8d-0048eaf50e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://gist.github.com/alon710/8ce957780ad4d5b03284158dd7271032", "content": "", "creation_timestamp": "2026-01-24T22:34:39.000000Z"}, {"uuid": "3a5235f2-d5bb-4e90-9e8f-3b71112f371f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://gist.github.com/alon710/26b1e024052763f2bc2806b7cc2488e8", "content": "", "creation_timestamp": "2026-01-24T22:34:36.000000Z"}, {"uuid": "741945e6-34f5-4330-b785-361f08042b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://gist.github.com/alon710/e73027932914f7c8d801134cd6acb90a", "content": "", "creation_timestamp": "2026-01-24T22:33:08.000000Z"}, {"uuid": "60c80d99-64ea-48e1-9b3a-4c110f82d1de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10997", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5594\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.\n\ud83d\udccf Published: 2025-01-06T13:52:20.272Z\n\ud83d\udccf Modified: 2025-04-08T20:40:13.684Z\n\ud83d\udd17 References:\n1. https://community.openvpn.net/openvpn/wiki/CVE-2024-5594\n2. https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", "creation_timestamp": "2025-04-08T20:46:39.000000Z"}, {"uuid": "0a7611f0-5f87-472f-87af-cdae03b139c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55945", "type": "seen", "source": "https://t.me/cvedetector/15360", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55945 - TYPO3 CSRF and HTTP Method Enforcement Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55945 \nPublished : Jan. 14, 2025, 8:15 p.m. | 37\u00a0minutes ago \nDescription : TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to `lax` or `none`. The vulnerability in the affected downstream component \u201cDB Check Module\u201d allows attackers to manipulate data through unauthorized actions. Users are advised to update to TYPO3 versions 11.5.42 ELTS which fixes the problem described. There are no known workarounds for this issue. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T22:22:52.000000Z"}, {"uuid": "7c870dff-2265-4183-8c38-d846883113ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55949", "type": "seen", "source": "https://t.me/CyberBulletin/26845", "content": "\u26a1\ufe0fCVE-2024-55949 (CVSS 9.3): Critical MinIO Flaw Allows Any User to Gain Full Admin Privileges.\n\n#CyberBulletin", "creation_timestamp": "2024-12-18T07:13:05.000000Z"}, {"uuid": "70a7ed4a-6925-49ef-a384-d17c082f0c0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "4810cfb2-ad71-48b9-a1cd-22ad5e7cba54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113702851146280575", "content": "", "creation_timestamp": "2024-12-23T15:30:22.100443Z"}, {"uuid": "847560c1-ae5e-4028-bb84-f33b985f2dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lfstwikgkk2w", "content": "", "creation_timestamp": "2025-01-15T22:48:15.549673Z"}, {"uuid": "bdacef74-2a36-47de-9e5a-1d88a2ef4e9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55945", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfq2xyuqwa2j", "content": "", "creation_timestamp": "2025-01-14T20:16:20.616628Z"}, {"uuid": "f2136dff-b007-4487-9d2b-077c26c789fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55948", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113948054191918592", "content": "", "creation_timestamp": "2025-02-04T22:48:43.730472Z"}, {"uuid": "565bc410-4227-447e-b165-7fc8c99c5a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/167", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-f2h8-4w6p-535w\n\ud83d\udd17 Aliases: CVE-2024-5594\n\ud83d\udd39 Details: OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:31:00Z\n\ud83d\uddd3\ufe0f Published: 2025-01-06T15:31:00Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-1287\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-5594\n2. https://community.openvpn.net/openvpn/wiki/CVE-2024-5594\n3. https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg0634.html", "creation_timestamp": "2025-01-06T15:36:48.000000Z"}, {"uuid": "774d680a-0e03-4946-aee2-e19ba3ee2ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55949", "type": "seen", "source": "https://t.me/CyberBulletin/1775", "content": "\u26a1\ufe0fCVE-2024-55949 (CVSS 9.3): Critical MinIO Flaw Allows Any User to Gain Full Admin Privileges.\n\n#CyberBulletin", "creation_timestamp": "2024-12-18T07:13:05.000000Z"}, {"uuid": "ef556beb-b627-4290-a218-7214ba28cfb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfch2pdqaf2e", "content": "", "creation_timestamp": "2025-01-09T10:15:20.601334Z"}, {"uuid": "00428de2-3457-4b53-ad8c-c6bf3e119d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfje3urz4s2t", "content": "", "creation_timestamp": "2025-01-12T04:10:56.617869Z"}, {"uuid": "c0f468fa-aa58-44d8-a063-f7c9874aa70f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-5594", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfc3jdphts2j", "content": "", "creation_timestamp": "2025-01-09T06:48:46.445722Z"}, {"uuid": "a4a63b02-4eea-451d-aa7b-92c3fe6ccbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfcrgrcl6j25", "content": "", "creation_timestamp": "2025-01-09T13:21:02.789497Z"}, {"uuid": "4b8d09de-747e-4748-b7fc-7520ba318b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55948", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhey44ijbq27", "content": "", "creation_timestamp": "2025-02-04T21:16:03.605657Z"}, {"uuid": "a0a0069c-0cae-4f37-a112-7384cb0c66e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55948", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf3uwkmww2f", "content": "", "creation_timestamp": "2025-02-04T22:23:43.215058Z"}, {"uuid": "38e6051a-0711-477d-a41a-c1eab6cf1620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-02", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "9de9c000-f379-4f8e-8260-721e87b263d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-0122b398-ead7a30f46f5b85a", "content": "", "creation_timestamp": "2025-12-12T15:59:44.273477Z"}, {"uuid": "f990344a-2579-483c-a4a2-5cc80b92767d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://bsky.app/profile/euvd-bot.bsky.social/post/3mcb3roipap2u", "content": "", "creation_timestamp": "2026-01-12T22:31:23.284339Z"}, {"uuid": "23fcfe95-586b-45de-abe5-6d374ff2e82a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://gist.github.com/alon710/2fd20a5f9307015a70cb6d5f894dfd78", "content": "", "creation_timestamp": "2026-01-24T21:24:49.000000Z"}, {"uuid": "f6442970-fd40-42e8-83a4-e41f8d770408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55948", "type": "seen", "source": "https://t.me/cvedetector/17249", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55948 - Discourse Anonymous Cache Poisoning\", \n  \"Content\": \"CVE ID : CVE-2024-55948 \nPublished : Feb. 4, 2025, 9:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions an attacker can make craft an XHR request to poison the anonymous cache (for example, the cache may have a response with missing  preloaded data). This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:51.000000Z"}, {"uuid": "dce0e5c1-c16b-41c3-97ba-027daa4eeab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5594", "type": "seen", "source": "https://t.me/cvedetector/14359", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5594 - OpenVPN PATH Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-5594 \nPublished : Jan. 6, 2025, 2:15 p.m. | 43\u00a0minutes ago \nDescription : OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T16:05:41.000000Z"}, {"uuid": "f8e4ad8b-42a4-4537-b20f-1a7114dd31fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55947", "type": "seen", "source": "https://t.me/cvedetector/13536", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55947 - \"Git Service Gogs Arbitrary File Write Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-55947 \nPublished : Dec. 23, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Gogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-23T18:20:00.000000Z"}, {"uuid": "ae3dc6ac-9ed0-4f0c-a2cc-0485e86820a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55949", "type": "seen", "source": "https://t.me/cvedetector/13033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55949 - MinIO IAM Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55949 \nPublished : Dec. 16, 2024, 8:15 p.m. | 17\u00a0minutes ago \nDescription : MinIO is a high-performance, S3 compatible object store, open sourced under GNU AGPLv3 license. Minio is subject to a privilege escalation in IAM import API, all users are impacted since MinIO commit `580d9db85e04f1b63cc2909af50f0ed08afa965f`. This issue has been addressed in commit `f246c9053f9603e610d98439799bdd2a6b293427` which is included in RELEASE.2024-12-13T22-19-12Z. There are no workarounds possible, all users are advised to upgrade immediately. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T21:33:06.000000Z"}, {"uuid": "a4c14037-ce50-4efe-8478-4f48591a125c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55946", "type": "seen", "source": "https://t.me/cvedetector/12903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55946 - Playloom Engine Collaborative Data Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55946 \nPublished : Dec. 13, 2024, 9:15 p.m. | 38\u00a0minutes ago \nDescription : Playloom Engine is an open-source, high-performance game development engine. Engine Beta v0.0.1 has a security vulnerability related to data storage, specifically when using the collaboration features. When collaborating with another user, they may have access to personal information you have entered into the software. This poses a risk to user privacy. The maintainers of Playloom Engine have temporarily disabled the collaboration feature until a fix can be implemented. When Engine Beta v0.0.2 is released, it is expected to contain a patch addressing this issue. Users should refrain from using the collaboration feature in the meantime. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T23:18:16.000000Z"}]}