{"uuid": "2aca1349-ca85-4710-8112-ea64e36da2a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29070", "type": "seen", "source": "https://t.me/cvedetector/1499", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-29070 - Apache Backend Unauthenticated Session Reuse\", \n  \"Content\": \"CVE ID : CVE-2024-29070 \nPublished : July 23, 2024, 9:15 a.m. | 37\u00a0minutes ago \nDescription : On versions before 2.1.4,\u00a0session is not invalidated after logout. When the user logged in successfully, the Backend service returns \"Authorization\" as the front-end authentication credential. \"Authorization\" can still initiate requests and access data even after logout.  \n  \nMitigation:  \n  \nall users should upgrade to 2.1.4 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T12:13:21.000000Z"}