{"vulnerability": "CVE-2024-6221", "sightings": [{"uuid": "eac7c205-6331-4753-a29b-90fe137dd28a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6221", "type": "seen", "source": "https://t.me/cvedetector/3474", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6221 - Corydolphin Flask-Cors Private Network Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6221 \nPublished : Aug. 18, 2024, 7:15 p.m. | 20\u00a0minutes ago \nDescription : A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T21:37:39.000000Z"}]}