{"vulnerability": "cve-2024-5231", "sightings": [{"uuid": "c960c34d-33cd-4b39-9e84-5f76e29c95ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9097", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-52316 - Apache Tomcat Authentication Bypass Vulnerability\nURL\uff1ahttps://github.com/TAM-K592/CVE-2024-52316\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-20T10:41:31.000000Z"}, {"uuid": "47ed7a3a-f233-4af6-88da-a35ea5a1add2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52317", "type": "seen", "source": "https://t.me/cvedetector/11331", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52317 - Apache Tomcat HTTP/2 Request-Response Mix-Up Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52317 \nPublished : Nov. 18, 2024, 12:15 p.m. | 39\u00a0minutes ago \nDescription : Incorrect object re-cycling and re-use vulnerability in Apache Tomcat.\u00a0Incorrect recycling of the request and response used by HTTP/2 requests   \ncould lead to request and/or response mix-up between users.  \n  \nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.  \n  \nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T14:02:39.000000Z"}, {"uuid": "5c83b54c-8afe-48dd-b3c0-bb43d71ac60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52312", "type": "seen", "source": "https://t.me/cvedetector/10253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52312 - VMware vRealize Automation Data Access Permission Weakness (Authorization Bypass)\", \n  \"Content\": \"CVE ID : CVE-2024-52312 \nPublished : Nov. 9, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : Due to inconsistent authorization permissions, data.all may allow an external actor with an authenticated account to perform restricted operations against DataSets and Environments. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T03:15:00.000000Z"}, {"uuid": "a51e667d-e2ea-414d-a3b9-b6a1fadea502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52311", "type": "seen", "source": "https://t.me/cvedetector/10252", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52311 - Amazon Cognito Unauthorized Token Persistence\", \n  \"Content\": \"CVE ID : CVE-2024-52311 \nPublished : Nov. 9, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : Authentication tokens issued via Cognito in data.all are not invalidated on log out, allowing for previously authenticated user to continue execution of authorized API Requests until token is expired. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T03:14:59.000000Z"}, {"uuid": "379c597e-6934-41de-a612-cc2d78eea71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52314", "type": "seen", "source": "https://t.me/cvedetector/10251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52314 - AWS CloudWatch Log Scanning Data Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52314 \nPublished : Nov. 9, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T03:14:59.000000Z"}, {"uuid": "92049650-8a4e-4b44-907b-fc27e092b7fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52319", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4jcswb22", "content": "", "creation_timestamp": "2025-01-11T13:16:30.566510Z"}, {"uuid": "4cd4ea31-498b-4b8e-984f-81e2437207ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52312", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m3fu76tebs2q", "content": "", "creation_timestamp": "2025-10-17T18:02:48.462017Z"}, {"uuid": "b7f63ebf-e826-438c-9dc4-19bf5fb37fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52318", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "bdd8826e-4581-44ff-8467-71ae7f163aaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52317", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9112", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-52317 - Apache Tomcat HTTP/2 Data Leakage Vulnerability\nURL\uff1ahttps://github.com/TAM-K592/CVE-2024-52317\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-21T06:25:38.000000Z"}, {"uuid": "14069827-e1ca-4744-a2b0-2bc72540127c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52318", "type": "seen", "source": "https://t.me/cvedetector/11333", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52318 - Apache Tomcat Object Recycling Reuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52318 \nPublished : Nov. 18, 2024, 1:15 p.m. | 32\u00a0minutes ago \nDescription : Incorrect object recycling and reuse vulnerability in Apache Tomcat.  \n  \nThis issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96.  \n  \nUsers are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T14:52:43.000000Z"}, {"uuid": "c3c5a652-3947-47d2-8205-a01fcbb2a022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "seen", "source": "https://t.me/cvedetector/11327", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52316 - Apache Tomcat Jakarta Authentication Unchecked Error Condition Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52316 \nPublished : Nov. 18, 2024, 12:15 p.m. | 39\u00a0minutes ago \nDescription : Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u00a0ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u00a0Authentication components that behave in this way.  \n  \nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.  \n  \nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T14:02:33.000000Z"}, {"uuid": "a0fc109f-9ee8-4b9b-8339-e5f189a3beb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "published-proof-of-concept", "source": "Telegram/H8dkisHY2jgjacfPXGpeeDffBvAPj99PBrNiacSL9ZORv2s", "content": "", "creation_timestamp": "2024-11-20T19:39:40.000000Z"}, {"uuid": "86aff979-58ec-42db-badf-829aceeab3ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113504075293155292", "content": "", "creation_timestamp": "2024-11-18T12:59:03.076727Z"}, {"uuid": "46770644-e100-4fe6-b57e-9a654192b751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfaq2njznt2z", "content": "", "creation_timestamp": "2025-01-08T17:51:02.627738Z"}, {"uuid": "95c7aa5d-1029-4ec3-b1ff-468a9b3fe1e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52317", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "1a3f446b-d1ed-4fa5-89f8-a67f17e7b431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "20dc6a2d-af8d-4209-b288-a46797e6f407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9096", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-52316 - Apache Tomcat Authentication Bypass Vulnerability\nURL\uff1ahttps://github.com/TAM-K592/CVE-2024-52316-\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-20T10:26:24.000000Z"}, {"uuid": "a45d9d3d-8b0f-4c49-8e43-5e034fd1a1d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52313", "type": "seen", "source": "https://t.me/cvedetector/10250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52313 - Apache Data All Environment Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52313 \nPublished : Nov. 9, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T03:14:57.000000Z"}, {"uuid": "07e9eb57-dade-4e5c-b45b-6841090e626f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52318", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503969452582589", "content": "", "creation_timestamp": "2024-11-18T12:32:09.537460Z"}, {"uuid": "81e38af2-afe6-4425-af07-ddad5c20e52e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52317", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503758756488282", "content": "", "creation_timestamp": "2024-11-18T11:38:33.206798Z"}, {"uuid": "c651e675-4882-46b6-ae29-abc465a9711b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52316", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503758741300861", "content": "", "creation_timestamp": "2024-11-18T11:38:32.944569Z"}, {"uuid": "47710c12-7dbc-498b-9c34-d027e258be3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52319", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1309", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52319\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nmm: use aligned address in clear_gigantic_page()\n\nIn current kernel, hugetlb_no_page() calls folio_zero_user() with the\nfault address.  Where the fault address may be not aligned with the huge\npage size.  Then, folio_zero_user() may call clear_gigantic_page() with\nthe address, while clear_gigantic_page() requires the address to be huge\npage size aligned.  So, this may cause memory corruption or information\nleak, addtional, use more obvious naming 'addr_hint' instead of 'addr' for\nclear_gigantic_page().\n\ud83d\udccf Published: 2025-01-11T12:35:39.280Z\n\ud83d\udccf Modified: 2025-01-11T12:35:39.280Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b79b6fe0737f233f0be1465052b7f0e75f324735\n2. https://git.kernel.org/stable/c/8aca2bc96c833ba695ede7a45ad7784c836a262e", "creation_timestamp": "2025-01-11T13:06:40.000000Z"}, {"uuid": "21414a86-e889-4e18-9736-a4259f272ddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52318", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3669", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52318\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: # Description:\nThe fix for improvement 69333 caused pooled JSP tags not to be released after use which in turn could cause output of some tags not to escaped as expected. This unescaped output could lead to XSS.\n\n# Versions Affected:\n- Apache Tomcat 11.0.0\n- Apache Tomcat 10.1.31\n- Apache Tomcat 9.0.96\n\n# Mitigation:\nUsers of the affected versions should apply one of the following\nmitigations:\n- Upgrade to Apache Tomcat 11.0.1 or later\n- Upgrade to Apache Tomcat 10.1.33 or later\nNote: 10.1.32 was not released\n- Upgrade to Apache Tomcat 9.0.97 or later\n\ud83d\udccf Published: 2024-11-18T15:33:20Z\n\ud83d\udccf Modified: 2025-01-31T15:42:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-52318\n2. https://github.com/apache/tomcat/commit/8d1fc4733a06d1a03b9d644c57010f2ec5f0df38\n3. https://github.com/apache/tomcat/commit/9813c5dd3259183f659bbb83312a5cf673cc1ebf\n4. https://github.com/apache/tomcat/commit/be8e32143a3159e78fe5463d09bb8e1b33bf2b1f\n5. https://bz.apache.org/bugzilla/show_bug.cgi?id=69333\n6. https://github.com/apache/tomcat\n7. https://lists.apache.org/thread/co243cw1nlh6p521c5265cm839wkqdp9\n8. https://security.netapp.com/advisory/ntap-20250131-0009\n9. http://www.openwall.com/lists/oss-security/2024/11/18/4", "creation_timestamp": "2025-01-31T16:14:57.000000Z"}]}