{"vulnerability": "CVE-2024-29736", "sightings": [{"uuid": "e9646f06-5d41-418f-9043-7399733e881b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29736", "type": "seen", "source": "https://t.me/cvedetector/1208", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-29736 - Apache CXF WADL SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-29736 \nPublished : July 19, 2024, 9:15 a.m. | 36\u00a0minutes ago \nDescription : A SSRF vulnerability in WADL service description in versions of Apache CXF before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform SSRF style attacks on REST webservices. The attack only applies if a custom stylesheet parameter is configured. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T12:01:50.000000Z"}]}