{"vulnerability": "CVE-2024-5558", "sightings": [{"uuid": "2dd5f263-f5f3-4aa4-a7f7-670980e5b3b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55580", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113620672108000112", "content": "", "creation_timestamp": "2024-12-09T03:11:09.547095Z"}, {"uuid": "0705a952-f997-4836-b481-704e1d01fbf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55582", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113620672121902819", "content": "", "creation_timestamp": "2024-12-09T03:11:09.716337Z"}, {"uuid": "c9146a49-fb06-4fb1-8de2-fd8d4cdf89e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55586", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113628846923942834", "content": "", "creation_timestamp": "2024-12-10T13:50:07.343110Z"}, {"uuid": "b47222fe-44a3-4aa4-8634-578a759ef92c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55581", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:34.000000Z"}, {"uuid": "b9751e1b-6433-49fc-9f3e-480803110838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55581", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj4jzudayr22", "content": "", "creation_timestamp": "2025-02-26T23:33:24.980841Z"}, {"uuid": "86064dc8-c55a-482f-bf31-4306dc4acfc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55585", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr2azeqfaw2k", "content": "", "creation_timestamp": "2025-06-07T21:08:14.350773Z"}, {"uuid": "516ede24-a76e-4c66-9010-7e822cb4baaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55581", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "082e1656-708e-4554-afe7-99174f95edad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55581", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5630", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55581\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When AdaCore Ada Web Server 25.0.0 is linked with GnuTLS, the default behaviour of AWS.Client is vulnerable to a man-in-the-middle attack because of lack of verification of an HTTPS server's certificate (unless the using program specifies a TLS configuration).\n\ud83d\udccf Published: 2025-02-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-26T22:00:39.646Z\n\ud83d\udd17 References:\n1. https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf", "creation_timestamp": "2025-02-26T22:24:29.000000Z"}, {"uuid": "7ef6bb71-91d7-401f-87d3-915dd8273a64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55581", "type": "seen", "source": "https://t.me/cvedetector/18962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55581 - AdaCore Ada Web Server TLS Certificate Verification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55581 \nPublished : Feb. 26, 2025, 10:15 p.m. | 33\u00a0minutes ago \nDescription : When AdaCore Ada Web Server 25.0.0 is linked with GnuTLS, the default behaviour of AWS.Client is vulnerable to a man-in-the-middle attack because of lack of verification of an HTTPS server's certificate (unless the using program specifies a TLS configuration). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T00:19:23.000000Z"}, {"uuid": "9eef6a13-bb00-428c-afbf-432a4296680c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55585", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55585\n\ud83d\udd25 CVSS Score: 9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:N/RE:M/U:Red)\n\ud83d\udd39 Description: In the moPS App through 1.8.618, all users can access administrative API endpoints without additional authentication, resulting in unrestricted read and write access, as demonstrated by /api/v1/users/resetpassword.\n\ud83d\udccf Published: 2025-06-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-13T07:27:37.060Z\n\ud83d\udd17 References:\n1. https://mops.eu\n2. https://karatemuffin.it/data/2025_06_07_CVE-2024-55585_update.json\n3. https://media.ccc.de/v/glt25-504-safety-ja-security-nein-analyse-eines-breit-eingesetzten-einsatzmanagmentsystems-\n4. https://www.mops.eu", "creation_timestamp": "2025-06-13T07:33:04.000000Z"}, {"uuid": "974b5c2b-1461-4de9-8ff8-6b46c811516e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55581", "type": "seen", "source": "Telegram/rSFMCi0scNf0MtGdf4nYI8TvEbmMDdWrU0iaA1Lz25n9gBgp", "content": "", "creation_timestamp": "2025-03-11T04:41:13.000000Z"}, {"uuid": "f1f29d90-a9ff-4483-9d48-5e62aaca27a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55580", "type": "seen", "source": "https://t.me/CyberBulletin/1717", "content": "\u26a1\ufe0fCVE-2024-55579 &amp; CVE-2024-55580: Qlik Sense Users Face Serious Security Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-12-09T13:14:06.000000Z"}, {"uuid": "708d21cb-df69-46f5-90b7-7cb1705da384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55582", "type": "seen", "source": "https://t.me/cvedetector/12351", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55582 - Oxide Unencrypted Control Plane Datastore Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-55582 \nPublished : Dec. 9, 2024, 3:15 a.m. | 17\u00a0minutes ago \nDescription : Oxide before 6 has unencrypted Control Plane datastores. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T04:39:31.000000Z"}, {"uuid": "46f5e4f2-fdfe-430d-b9e5-90e4e5e53b35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55586", "type": "seen", "source": "https://t.me/cvedetector/12499", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55586 - Nette Database SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-55586 \nPublished : Dec. 10, 2024, 2:30 p.m. | 37\u00a0minutes ago \nDescription : Nette Database through 3.2.4 allows SQL injection in certain situations involving an untrusted filter that is directly passed to the where method. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:07.000000Z"}, {"uuid": "a2726fa0-943d-4500-992c-2a3613e3e2a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55580", "type": "seen", "source": "https://t.me/cvedetector/12350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55580 - Qlik Sense Enterprise Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55580 \nPublished : Dec. 9, 2024, 3:15 a.m. | 17\u00a0minutes ago \nDescription : An issue was discovered in Qlik Sense Enterprise for Windows before November 2024 IR. Unprivileged users with network access may be able to execute remote commands that could cause high availability damages, including high integrity and confidentiality risks. This is fixed in November 2024 IR, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T04:39:30.000000Z"}, {"uuid": "59ac60d6-d1f7-4623-8245-094025e0422b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55580", "type": "seen", "source": "https://t.me/CyberBulletin/26742", "content": "\u26a1\ufe0fCVE-2024-55579 &amp; CVE-2024-55580: Qlik Sense Users Face Serious Security Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-12-09T13:14:06.000000Z"}]}