{"vulnerability": "CVE-2024-2476", "sightings": [{"uuid": "46a8c236-80eb-45ff-831e-dd582996c591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24763", "type": "seen", "source": "https://t.me/ctinow/188850", "content": "https://ift.tt/vslDWm6\nCVE-2024-24763", "creation_timestamp": "2024-02-20T19:27:23.000000Z"}, {"uuid": "26cd3f3d-6fbe-4ad3-be71-071ffc837e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24766", "type": "seen", "source": "https://t.me/ctinow/201777", "content": "https://ift.tt/zsHVtW2\nCVE-2024-24766", "creation_timestamp": "2024-03-06T20:36:15.000000Z"}, {"uuid": "9be66947-2b49-4472-af5e-ed62ceaf91fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24762", "type": "seen", "source": "https://t.me/ctinow/196400", "content": "https://ift.tt/JTMKYFV\nCVE-2024-24762 | tiangolo fastapi prior 0.109.0 HTTP Header Content-Type resource consumption", "creation_timestamp": "2024-02-29T09:27:10.000000Z"}, {"uuid": "50195b19-28c2-43b9-920d-319961035d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24768", "type": "seen", "source": "https://t.me/ctinow/196401", "content": "https://ift.tt/FkgG7qc\nCVE-2024-24768 | 1Panel up to 1.9.5 cleartext transmission (GHSA-9xfw-jjq2-7v8h)", "creation_timestamp": "2024-02-29T09:27:11.000000Z"}, {"uuid": "2a39b5f7-484e-49d8-92b5-13100ed673ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24762", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24762\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: `python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.\n\ud83d\udccf Published: 2024-02-05T14:33:06.481Z\n\ud83d\udccf Modified: 2025-05-09T16:32:50.015Z\n\ud83d\udd17 References:\n1. https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p\n2. https://github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4\n3. https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389\n4. https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238\n5. https://github.com/andrew-d/python-multipart/blob/d3d16dae4b061c34fe9d3c9081d9800c49fc1f7a/multipart/multipart.py#L72-L74\n6. https://github.com/encode/starlette/commit/13e5c26a27f4903924624736abd6131b2da80cc5\n7. https://github.com/tiangolo/fastapi/commit/9d34ad0ee8a0dfbbcce06f76c2d5d851085024fc\n8. https://github.com/tiangolo/fastapi/releases/tag/0.109.1", "creation_timestamp": "2025-05-09T17:25:46.000000Z"}, {"uuid": "cd5ab463-220e-452f-9ee3-0de85d282bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24761", "type": "seen", "source": "https://t.me/ctinow/201698", "content": "https://ift.tt/YqoOLwa\nCVE-2024-24761", "creation_timestamp": "2024-03-06T19:32:09.000000Z"}, {"uuid": "4b4f1ce4-27b8-4aca-9ca0-ab605e991d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24767", "type": "seen", "source": "https://t.me/ctinow/201694", "content": "https://ift.tt/Mf58cv6\nCVE-2024-24767", "creation_timestamp": "2024-03-06T19:27:07.000000Z"}, {"uuid": "a6bd15a7-ffe2-4e8b-a125-dcc8ca25d4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24767", "type": "seen", "source": "https://t.me/ctinow/201700", "content": "https://ift.tt/Mf58cv6\nCVE-2024-24767", "creation_timestamp": "2024-03-06T19:32:12.000000Z"}, {"uuid": "7175d68b-3f25-4cc7-a2c3-154a6f282630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24765", "type": "seen", "source": "https://t.me/ctinow/201699", "content": "https://ift.tt/4zt8Vwi\nCVE-2024-24765", "creation_timestamp": "2024-03-06T19:32:10.000000Z"}, {"uuid": "7fc164de-6f20-4c08-bf1c-a419586b10ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24766", "type": "seen", "source": "https://t.me/ctinow/201756", "content": "https://ift.tt/zsHVtW2\nCVE-2024-24766", "creation_timestamp": "2024-03-06T20:26:45.000000Z"}, {"uuid": "47fac54d-6bd6-40ee-85e7-4866bcc7556d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24765", "type": "seen", "source": "https://t.me/ctinow/201693", "content": "https://ift.tt/4zt8Vwi\nCVE-2024-24765", "creation_timestamp": "2024-03-06T19:27:06.000000Z"}, {"uuid": "126e4534-376b-45cf-b434-70a634cb3351", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24761", "type": "seen", "source": "https://t.me/ctinow/201692", "content": "https://ift.tt/YqoOLwa\nCVE-2024-24761", "creation_timestamp": "2024-03-06T19:27:05.000000Z"}, {"uuid": "165d6e0e-1340-4be8-aaf5-560a3a2fcc2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24763", "type": "seen", "source": "https://t.me/ctinow/188866", "content": "https://ift.tt/vslDWm6\nCVE-2024-24763", "creation_timestamp": "2024-02-20T19:32:14.000000Z"}, {"uuid": "579cc9d0-7979-499b-8938-7cc627a80b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24762", "type": "seen", "source": "https://t.me/ctinow/183575", "content": "https://ift.tt/nF8rCPw\nCVE-2024-24762 Exploit", "creation_timestamp": "2024-02-13T03:16:21.000000Z"}, {"uuid": "f5d6b79a-e31a-4a30-8b76-f5ea57c925e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24760", "type": "seen", "source": "https://t.me/ctinow/192814", "content": "https://ift.tt/gUwa34k\nCVE-2024-24760 | mailcow prior 2024-01c external reference (GHSA-gmpj-5xcm-xxx6)", "creation_timestamp": "2024-02-25T10:11:14.000000Z"}, {"uuid": "c608edc9-7f79-4a0a-80b7-d7e6d327aa1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24768", "type": "seen", "source": "https://t.me/ctinow/179314", "content": "https://ift.tt/lInHzE5\nCVE-2024-24768", "creation_timestamp": "2024-02-05T16:31:20.000000Z"}, {"uuid": "02ffedaf-e349-4dd0-babb-30a4320c0d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24762", "type": "seen", "source": "https://t.me/ctinow/179313", "content": "https://ift.tt/9DJhoWX\nCVE-2024-24762", "creation_timestamp": "2024-02-05T16:31:19.000000Z"}]}