{"vulnerability": "CVE-2024-13189", "sightings": [{"uuid": "28c81265-2261-48b4-b10b-27ddda705e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13189", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113794546486780376", "content": "", "creation_timestamp": "2025-01-08T20:09:41.839933Z"}, {"uuid": "88f83dbc-54fc-480d-9914-ac0166ec5c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13189", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfay5jjjzd2l", "content": "", "creation_timestamp": "2025-01-08T20:15:48.832362Z"}, {"uuid": "a662ecda-320c-400a-91a6-af9701e90064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13189", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/813", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13189\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in ZeroWdd myblog 1.0. This affects an unknown part of the file src/main/java/com/wdd/myblog/config/MyBlogMvcConfig.java. The manipulation leads to permission issues. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-01-08T20:00:09.819Z\n\ud83d\udccf Modified: 2025-01-08T20:00:09.819Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.290781\n2. https://vuldb.com/?ctiid.290781\n3. https://vuldb.com/?submit.469223\n4. https://github.com/ZeroWdd/myblog/issues/1\n5. https://github.com/ZeroWdd/myblog/issues/1#issue-2759828006", "creation_timestamp": "2025-01-08T20:13:57.000000Z"}, {"uuid": "c76fc2fe-eda1-48f5-afdf-f33ec2c312ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13189", "type": "seen", "source": "https://t.me/cvedetector/14732", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13189 - ZeroWdd MyBlog Remote File Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13189 \nPublished : Jan. 8, 2025, 8:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in ZeroWdd myblog 1.0. This affects an unknown part of the file src/main/java/com/wdd/myblog/config/MyBlogMvcConfig.java. The manipulation leads to permission issues. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T21:41:01.000000Z"}]}