{"vulnerability": "cve-2024-25270", "sightings": [{"uuid": "6c2890e0-e790-49d8-aeda-8c3e65c825fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-25270", "type": "seen", "source": "https://t.me/cvedetector/5521", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25270 - Mirapolis LMS IDOR Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-25270 \nPublished : Sept. 12, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : An issue in Mirapolis LMS 4.6.XX allows authenticated users to exploit an Insecure Direct Object Reference (IDOR) vulnerability by manipulating the ID parameter and increment STEP parameter, leading to the exposure of sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T21:53:44.000000Z"}, {"uuid": "781ad7db-5fcb-4bce-9908-254fad114464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-25270", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8711", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25270\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Mirapolis LMS 4.6.XX allows authenticated users to exploit an Insecure Direct Object Reference (IDOR) vulnerability by manipulating the ID parameter and increment STEP parameter, leading to the exposure of sensitive user data.\n\ud83d\udccf Published: 2024-09-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T16:10:42.384Z\n\ud83d\udd17 References:\n1. https://github.com/fbkcs/CVE-2024-25270", "creation_timestamp": "2025-03-25T16:25:18.000000Z"}]}