{"vulnerability": "CVE-2024-52513", "sightings": [{"uuid": "08656124-fb5b-451b-8060-52e4f9eb37bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52513", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113488105419832343", "content": "", "creation_timestamp": "2024-11-15T17:17:42.267714Z"}, {"uuid": "e41a758a-f402-4064-bec6-8349b1c82b89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52513", "type": "seen", "source": "https://t.me/cvedetector/11130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52513 - Nextcloud Server File Download without Password Protection\", \n  \"Content\": \"CVE ID : CVE-2024-52513 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After receiving a \"Files drop\" or \"Password protected\" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:04.000000Z"}]}