{"vulnerability": "CVE-2024-47212", "sightings": [{"uuid": "a669db45-0f4e-4557-88b7-7c911e801954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114276298770722682", "content": "", "creation_timestamp": "2025-04-03T22:05:38.757618Z"}, {"uuid": "1f8a74b8-b1da-44eb-8243-682ec237bb53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114276298770722682", "content": "", "creation_timestamp": "2025-04-03T22:05:38.756004Z"}, {"uuid": "52586d8d-772f-4abe-ac26-da4aefcf36f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxact43xb2r", "content": "", "creation_timestamp": "2025-04-04T01:11:42.406401Z"}, {"uuid": "287ba73a-c92c-447c-ba40-06f1c5b82b5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxactdbul2h", "content": "", "creation_timestamp": "2025-04-04T01:11:43.607882Z"}, {"uuid": "1d2f6afc-09b7-4252-a44a-a00b72649308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10349", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47212\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Iglu Server 0.13.0 and below. It involves sending very large payloads to a particular API endpoint of Iglu Server and can render it completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-03T20:15:54.231Z\n\ud83d\udd17 References:\n1. https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", "creation_timestamp": "2025-04-03T20:35:57.000000Z"}, {"uuid": "a0ef14d2-9315-4d23-a43a-db31ba16143b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://t.me/cvedetector/22045", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47212 - Iglu Server Denial of Service (DoS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47212 \nPublished : April 3, 2025, 9:15 p.m. | 2\u00a0hours, 9\u00a0minutes ago \nDescription : An issue was discovered in Iglu Server 0.13.0 and below. It involves sending very large payloads to a particular API endpoint of Iglu Server and can render it completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T02:07:08.000000Z"}, {"uuid": "c4f99782-8e5a-4bed-acd7-ef1e6a8cc377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47212", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47214\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Iglu Server 0.13.0 and below. It is similar to CVE-2024-47212, but involves a different kind of malicious payload. As above, it can render Iglu Server completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-03T20:22:16.256Z\n\ud83d\udd17 References:\n1. https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", "creation_timestamp": "2025-04-03T20:35:44.000000Z"}]}