{"vulnerability": "CVE-2024-27351", "sightings": [{"uuid": "aff022db-b359-4750-b32c-de1cecb608e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3m6mcxqalku2r", "content": "", "creation_timestamp": "2025-11-27T11:58:33.522702Z"}, {"uuid": "fcc7e003-03b6-4169-8867-13729cc9fe73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/199142", "content": "https://ift.tt/O59KsRi\nCVE-2024-27351", "creation_timestamp": "2024-03-04T10:41:04.000000Z"}, {"uuid": "0f645fc7-97ad-4567-bf62-af0c00c7669d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/209169", "content": "https://ift.tt/qJmgjZp\nCVE-2024-27351", "creation_timestamp": "2024-03-15T21:26:22.000000Z"}, {"uuid": "516deef8-bce6-4ab4-992e-7e147d82713a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/209156", "content": "https://ift.tt/qJmgjZp\nCVE-2024-27351", "creation_timestamp": "2024-03-15T21:22:09.000000Z"}, {"uuid": "5c3d1f19-843e-4f68-8279-d99431aa6b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/200048", "content": "https://ift.tt/Ca6L0Jb\nCVE-2024-27351 | Django up to 3.2.24/4.2.10/5.0.2 Regular Expression django.utils.text.Truncator.words redos", "creation_timestamp": "2024-03-05T09:42:27.000000Z"}, {"uuid": "d1ecc87e-8cd7-46db-a72f-6b156550d6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/arpsyndicate/4254", "content": "#ExploitObserverAlert\n\nCVE-2024-27351\n\nDESCRIPTION: Exploit Observer has 48 entries in 6 file formats related to CVE-2024-27351. In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.", "creation_timestamp": "2024-03-16T21:03:26.000000Z"}]}