{"vulnerability": "CVE-2024-6923", "sightings": [{"uuid": "929b17f7-18c6-477f-8ca0-6bf0cb0a4cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6923", "type": "seen", "source": "https://t.me/cvedetector/2233", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6923 - Cisco Python Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6923 \nPublished : Aug. 1, 2024, 2:15 p.m. | 47\u00a0minutes ago \nDescription : There is a MEDIUM severity vulnerability affecting CPython.  \n  \nThe   \nemail module didn\u2019t properly quote newlines for email headers when   \nserializing an email message allowing for header injection when an email  \n is serialized. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T17:05:42.000000Z"}, {"uuid": "49c09383-6c5f-49e6-8c7c-a372b1d84f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-6923", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}]}