{"vulnerability": "CVE-2024-56059", "sightings": [{"uuid": "6005d331-e1d6-4c05-a2fc-85b3b89f1a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "published-proof-of-concept", "source": "Telegram/nQrdilQjQl99lIMRwlBIzfx1gXvNFdI2V5simBs1rgDfZ-k", "content": "", "creation_timestamp": "2025-01-14T22:00:06.000000Z"}, {"uuid": "fc82eb0e-117f-46db-9472-04eef6e8a5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113826790060488122", "content": "", "creation_timestamp": "2025-01-14T12:49:39.788351Z"}, {"uuid": "f2690572-24f0-41b9-af2f-88a06ba733a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/114059640087504082", "content": "", "creation_timestamp": "2025-02-24T15:46:28.972290Z"}, {"uuid": "1622c41f-95a6-4e8f-8fc3-fe2e6c054562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:06.000000Z"}, {"uuid": "5aa278ce-cb33-4d62-87a3-333894d8378a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "6635c934-cf03-4369-ad50-5a7dab679259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "seen", "source": "https://t.me/cvedetector/13181", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56059 - Mighty Digital Partners Object Prototype Pollution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56059 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mighty Digital Partners allows Object Injection.This issue affects Partners: from n/a through 0.2.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:33.000000Z"}, {"uuid": "ed7b9757-98e3-4260-b1fe-e3d6474fe8b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56059", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673843515493237", "content": "", "creation_timestamp": "2024-12-18T12:33:20.648452Z"}]}