{"vulnerability": "CVE-2024-6232", "sightings": [{"uuid": "f9aa18b2-34a2-4375-ac88-dee26e9d7985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6232", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "d72fe2d2-84ae-4ff9-bd66-905ece63c012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6232", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8248", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-6232\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\n\ud83d\udccf Published: 2024-09-03T12:29:00.102Z\n\ud83d\udccf Modified: 2025-03-20T18:02:26.275Z\n\ud83d\udd17 References:\n1. https://github.com/python/cpython/pull/121286\n2. https://github.com/python/cpython/issues/121285\n3. https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/\n4. https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06\n5. https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4\n6. https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf\n7. https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373\n8. https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d\n9. https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877\n10. https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4", "creation_timestamp": "2025-03-20T18:20:45.000000Z"}, {"uuid": "f271fb13-2ea5-4815-ba65-841f654a5e27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6232", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:39.625260Z"}, {"uuid": "f6032f83-2da8-427a-bcc2-e5c27b3470a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6232", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:49.677576Z"}, {"uuid": "cee8c9d2-50d9-4492-858c-1cc5a46d7c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6232", "type": "seen", "source": "https://t.me/cvedetector/4683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6232 - Python CPython ReDoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6232 \nPublished : Sept. 3, 2024, 1:15 p.m. | 27\u00a0minutes ago \nDescription : There is a MEDIUM severity vulnerability affecting CPython.  \n  \n  \n  \n  \n  \nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T15:48:09.000000Z"}]}