{"uuid": "c4f99782-8e5a-4bed-acd7-ef1e6a8cc377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47214\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Iglu Server 0.13.0 and below. It is similar to CVE-2024-47212, but involves a different kind of malicious payload. As above, it can render Iglu Server completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-03T20:22:16.256Z\n\ud83d\udd17 References:\n1. https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", "creation_timestamp": "2025-04-03T20:35:44.000000Z"}