{"vulnerability": "CVE-2024-55075", "sightings": [{"uuid": "0fd12979-2bee-4513-8505-43ce027f33d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55075", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113783287128672013", "content": "", "creation_timestamp": "2025-01-06T20:26:17.637386Z"}, {"uuid": "00e4a406-67b5-4508-9e54-b45228d673ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55075", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf42kdbfdu2l", "content": "", "creation_timestamp": "2025-01-06T21:15:27.148814Z"}, {"uuid": "54845252-10f1-403f-8af4-709abc0f6361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55075", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf44mvkj262y", "content": "", "creation_timestamp": "2025-01-06T21:52:41.671998Z"}, {"uuid": "fcc93116-58f8-46b9-b904-42471f06bf5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55075", "type": "seen", "source": "https://t.me/cvedetector/14408", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55075 - Grocy Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-55075 \nPublished : Jan. 6, 2025, 9:15 p.m. | 26\u00a0minutes ago \nDescription : Grocy through 4.3.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T22:48:07.000000Z"}, {"uuid": "78045ddc-1552-44a6-b6fe-41238ff29309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55075", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/214", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55075\n\ud83d\udd39 Description: Grocy through 4.2.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes.\n\ud83d\udccf Published: 2025-01-06T00:00:00\n\ud83d\udccf Modified: 2025-01-06T20:29:03.659Z\n\ud83d\udd17 References:\n1. https://m10x.de/posts/2024/11/all-your-recipe-are-belong-to-us-part-1/3-stored-xss-csrf-and-broken-access-control-vulnerabilities-in-grocy/", "creation_timestamp": "2025-01-06T20:48:32.000000Z"}]}