{"vulnerability": "cve-2024-10524", "sightings": [{"uuid": "3ed94636-aa1c-483f-be5e-b603c22b0a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10524", "type": "seen", "source": "https://t.me/cvedetector/11453", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10524 - Apache Wget Credentials Arp Spoofing\", \n  \"Content\": \"CVE ID : CVE-2024-10524 \nPublished : Nov. 19, 2024, 3:15 p.m. | 25\u00a0minutes ago \nDescription : Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T16:48:32.000000Z"}, {"uuid": "00471240-1386-4dd6-9a1d-410afcc62651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10524", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:40.780447Z"}, {"uuid": "53b1f7c4-6c5f-4c35-991a-f2b930a0a3ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-10524", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "3a0234b9-bf29-4cc7-b842-183af9e892f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-10524", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510115411088128", "content": "", "creation_timestamp": "2024-11-19T14:35:08.414796Z"}, {"uuid": "230ba112-06e8-45e4-8604-5356ec1e780b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10524", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "2bc37ddf-6ca5-4f3a-b91c-8d0440c75fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10524", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8396", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10524\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.\n\ud83d\udccf Published: 2024-11-19T14:23:09.718Z\n\ud83d\udccf Modified: 2025-03-21T18:03:44.339Z\n\ud83d\udd17 References:\n1. https://seclists.org/oss-sec/2024/q4/107\n2. https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/\n3. https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778", "creation_timestamp": "2025-03-21T18:19:58.000000Z"}]}