{"uuid": "ab74bf8b-4bad-403d-92c1-6515f9abd2fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3799", "type": "seen", "source": "https://t.me/cvedetector/535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3799 - Insecure handling of POST header parameter body\u00a0in\", \n  \"Content\": \"CVE ID : CVE-2024-3799 \nPublished : July 10, 2024, 12:15 p.m. | 18\u00a0minutes ago \nDescription : Insecure handling of POST header parameter body\u00a0included in requests being sent to an instance of the open-source project\u00a0Phoniebox allows an attacker to create a website, which \u2013 when visited by a user \u2013 will send\u00a0malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause a\u00a0shell command execution.  \n  \n  \nThis issue affects Phoniebox in all releases through 2.7. Newer releases were not tested, but they might also be vulnerable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T14:41:36.000000Z"}