{"vulnerability": "cve-2024-5082", "sightings": [{"uuid": "a0838469-918c-4c5d-ad47-9f719b9b6bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-5082", "type": "seen", "source": "https://github.blog/security/vulnerability-research/attacks-on-maven-proxy-repositories/", "content": "", "creation_timestamp": "2025-01-22T17:00:51.000000Z"}, {"uuid": "062e3e6a-8ab8-4e26-a92f-e8e8dc7a8468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50829", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482443206463361", "content": "", "creation_timestamp": "2024-11-14T17:17:43.645303Z"}, {"uuid": "6efdd42b-d6ee-476e-8427-c4297e118d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5082", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhhhs3cmnj2y", "content": "", "creation_timestamp": "2025-02-05T21:02:09.983036Z"}, {"uuid": "d1d2550b-a66e-4456-a24f-01b4892db0ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5082", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-5082.yaml", "content": "", "creation_timestamp": "2025-02-03T11:14:04.000000Z"}, {"uuid": "adfe9546-dded-4529-9592-a4793d65a0cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5082", "type": "seen", "source": "https://t.me/cvedetector/10904", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5082 - Sonatype Nexus Repository Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-5082 \nPublished : Nov. 14, 2024, 3:15 a.m. | 38\u00a0minutes ago \nDescription : A Remote Code Execution vulnerability has been discovered in Sonatype Nexus Repository 2.\u00a0  \n  \nThis issue affects Nexus Repository 2 OSS/Pro versions up to and including 2.15.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T04:56:52.000000Z"}, {"uuid": "591028bb-f9ca-4acc-a837-141d44165e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5082", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113479113854160730", "content": "", "creation_timestamp": "2024-11-14T03:11:01.758495Z"}, {"uuid": "401b987d-57ef-43d4-a55e-98dd9ba38d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50826", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482489178632663", "content": "", "creation_timestamp": "2024-11-14T17:29:25.537216Z"}, {"uuid": "fae2f389-e306-4a80-adcc-979674fb4f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50827", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482489194316740", "content": "", "creation_timestamp": "2024-11-14T17:29:25.577698Z"}, {"uuid": "43e2f361-dc6a-4b66-acff-6f190e2cf902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50828", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482489230397726", "content": "", "creation_timestamp": "2024-11-14T17:29:25.913034Z"}, {"uuid": "13f7a36a-6b95-4d76-8cc0-a0f8f55e60d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50826", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482501269576658", "content": "", "creation_timestamp": "2024-11-14T17:32:29.769143Z"}, {"uuid": "23a425f2-1c42-4d06-8d31-98b81564923c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50827", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482501293843963", "content": "", "creation_timestamp": "2024-11-14T17:32:30.007414Z"}, {"uuid": "ac5874e4-aa77-423f-865f-16859af83688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50828", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482501307801686", "content": "", "creation_timestamp": "2024-11-14T17:32:30.199797Z"}]}