{"vulnerability": "CVE-2024-7592", "sightings": [{"uuid": "35ed58ef-2574-4a4e-b89c-94dac5265699", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7592", "type": "seen", "source": "https://gist.github.com/EbonJaeger/e90b3b1b9e58a38f14cd0ffb590c7ece", "content": "", "creation_timestamp": "2025-01-31T20:58:30.000000Z"}, {"uuid": "31aa8c7d-922f-438f-9e26-74aa68b4c934", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7592", "type": "seen", "source": "https://t.me/cvedetector/3552", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7592 - Python CPython Cookie Parsing CPU Overload\", \n  \"Content\": \"CVE ID : CVE-2024-7592 \nPublished : Aug. 19, 2024, 7:15 p.m. | 31\u00a0minutes ago \nDescription : There is a LOW severity vulnerability affecting CPython, specifically the  \n'http.cookies' standard library module.  \n  \n  \nWhen parsing cookies that contained backslashes for quoted characters in  \nthe cookie value, the parser would use an algorithm with quadratic  \ncomplexity, resulting in excess CPU resources being used while parsing the  \nvalue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T21:53:12.000000Z"}]}