{"vulnerability": "cve-2024-5259", "sightings": [{"uuid": "193d0a63-0352-401c-85a9-d90c17a3ed9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52597", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515677629085542", "content": "", "creation_timestamp": "2024-11-20T14:09:40.688206Z"}, {"uuid": "b389517e-2d61-457e-b7b8-654ad2e34b4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52598", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515721004503367", "content": "", "creation_timestamp": "2024-11-20T14:20:42.511093Z"}, {"uuid": "71e44d89-876b-431b-a19f-614b4e460c84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113560234590577110", "content": "", "creation_timestamp": "2024-11-28T11:01:07.135836Z"}, {"uuid": "767359a3-40dc-4bec-9a9f-1d823c5cc170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113675448878441837", "content": "", "creation_timestamp": "2024-12-18T19:21:36.529591Z"}, {"uuid": "aa43aced-ff71-41a3-bbdb-3fde8732ed35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52592", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113675448892829570", "content": "", "creation_timestamp": "2024-12-18T19:21:36.800992Z"}, {"uuid": "8174552e-9f11-4e6f-8401-7afcad2dd7e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52593", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113675448907156149", "content": "", "creation_timestamp": "2024-12-18T19:21:37.036304Z"}, {"uuid": "26a895ac-e6e4-4855-90b9-5b57a40e8e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52594", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuyjoogbz2r", "content": "", "creation_timestamp": "2025-01-16T19:15:51.350718Z"}, {"uuid": "0add9c7f-ae3f-4577-aa68-dfd030960f1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52594", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24f2k532h", "content": "", "creation_timestamp": "2025-01-16T19:44:12.605032Z"}, {"uuid": "a9837b41-be50-4583-bd2e-9dfb92d9aaec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lk56ag3gql2d", "content": "", "creation_timestamp": "2025-03-11T23:00:07.874048Z"}, {"uuid": "78ab860d-e276-4bff-a171-139b1a04db76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lk2cmbftsd2v", "content": "", "creation_timestamp": "2025-03-10T19:40:22.210767Z"}, {"uuid": "9830e453-8350-4bec-b329-fb72c03970f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3lk3koteo422c", "content": "", "creation_timestamp": "2025-03-11T07:37:39.671203Z"}, {"uuid": "8e9e70a5-2236-4c51-a457-a56bfb4608d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lk3vyw77ib2z", "content": "", "creation_timestamp": "2025-03-11T11:00:07.186484Z"}, {"uuid": "dc906fab-f809-47f7-a1ee-1326663d5aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52592", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:03.000000Z"}, {"uuid": "b122e0ec-eda8-4806-ab69-210400e7e628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52592", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "3f44f442-16cf-4b62-a295-297649f6a8a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52593", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "8f440b46-3e4f-4d34-867e-190f573eae14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52593", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:03.000000Z"}, {"uuid": "67c9cad4-01c9-4116-afe2-c944d946447a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52594", "type": "seen", "source": "https://t.me/cvedetector/15614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52594 - Gomatrixserverlib SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-52594 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : Gomatrixserverlib is a Go library for matrix federation. Gomatrixserverlib is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. The commit `c4f1e01` fixes this issue. Users are advised to upgrade. Users unable to upgrade should use a local firewall to limit the network segments and hosts the service using gomatrixserverlib can access. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:22.000000Z"}, {"uuid": "30a2ef53-e8c5-4274-ad6d-3336a6ad96a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://t.me/cvedetector/19994", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25306 - Misskey ActivityPub Object Authority Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-25306 \nPublished : March 10, 2025, 7:15 p.m. | 2\u00a0hours, 17\u00a0minutes ago \nDescription : Misskey is an open source, federated social media platform. The patch for CVE-2024-52591 did not sufficiently validate the relation between the `id` and `url` fields of ActivityPub objects. An attacker can forge an object where they claim authority in the `url` field even if the specific ActivityPub object type require authority in the `id` field. Version 2025.2.1 addresses the issue. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:49.000000Z"}, {"uuid": "216d1ded-5eea-40fe-b34c-53971a5d2459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52593", "type": "seen", "source": "https://t.me/cvedetector/13248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52593 - Misskey Cross-Site Scripting (XSS) vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52593 \nPublished : Dec. 18, 2024, 8:15 p.m. | 36\u00a0minutes ago \nDescription : Misskey is an open source, federated social media platform.In affected versions missing validation in `NoteCreateService.insertNote`, `ApPersonService.createPerson`, and `ApPersonService.updatePerson` allows an attacker to control the target of any \"origin\" links (such as the \"view on remote instance\" banner). Any HTTPS URL can be set, even if it belongs to a different domain than the note / user. Vulnerable Misskey instances will use the unverified URL for several clickable links, allowing an attacker to conduct phishing or other attacks against remote users. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T22:03:58.000000Z"}, {"uuid": "2da0d75d-597d-424c-80dc-dfa95ce639f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52592", "type": "seen", "source": "https://t.me/cvedetector/13247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52592 - \"Misskey Poll Spoofing Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-52592 \nPublished : Dec. 18, 2024, 8:15 p.m. | 36\u00a0minutes ago \nDescription : Misskey is an open source, federated social media platform. In affected versions missing validation in `ApInboxService.update` allows an attacker to modify the result of polls belonging to another user. No authentication is required, except for a valid signature from any actor on any remote instance. Vulnerable Misskey instances will accept spoofed updates for remote polls. Local polls are unaffected. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T22:03:57.000000Z"}, {"uuid": "42e32fca-dc87-4018-8bd8-30d287d6927c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52591", "type": "seen", "source": "https://t.me/cvedetector/13246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52591 - Misskey Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52591 \nPublished : Dec. 18, 2024, 8:15 p.m. | 36\u00a0minutes ago \nDescription : Misskey is an open source, federated social media platform. In affected versions missing validation in `ApRequestService.signedGet` and `HttpRequestService.getActivityJson` allows an attacker to create fake user profiles and forged notes. The spoofed users will appear to be from a different instance than the one where they actually exist, and the forged notes will appear to be posted by a different user. Vulnerable Misskey instances will accept the spoofed objects as valid, allowing an attacker to impersonate other users and instances. The attacker retains full control of the spoofed user / note and can interact like a real account. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T22:03:56.000000Z"}, {"uuid": "e5fcabd0-4ec7-4987-9980-7718d5fbb9c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52590", "type": "seen", "source": "https://t.me/cvedetector/13245", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52590 - Misskey Cross-Site Request Forgery (CSRF) User Profile Spoofing\", \n  \"Content\": \"CVE ID : CVE-2024-52590 \nPublished : Dec. 18, 2024, 8:15 p.m. | 36\u00a0minutes ago \nDescription : Misskey is an open source, federated social media platform. In affected versions missing validation in `ApRequestService.signedGet` allows an attacker to create fake user profiles that appear to be from a different instance than the one where they actually exist. These profiles can be used to impersonate existing users from the target instance. Vulnerable Misskey instances will accept spoofed users as valid, allowing an attacker to impersonate users on another instance. Attackers have full control of the spoofed user and can post, renote, or otherwise interact like a real account. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T22:03:55.000000Z"}, {"uuid": "bc115e15-4102-4524-9cbe-e309b756f11d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52599", "type": "seen", "source": "https://t.me/cvedetector/12443", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52599 - Tuleap Gantt Chart Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52599 \nPublished : Dec. 9, 2024, 7:15 p.m. | 44\u00a0minutes ago \nDescription : Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 16.1.99.50 and Tuleap Enterprise Edition prior to versions 16.1-4 and 16.0-7, a malicious user with the ability to create an artifact in a tracker with a Gantt chart could force a victim to execute uncontrolled code. Tuleap Community Edition 16.1.99.50, Tuleap Enterprise Edition 16.1-4, and Tuleap Enterprise Edition 16.0-7 contain a fix. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T21:24:08.000000Z"}, {"uuid": "53bd52a9-0ce5-4e53-88c3-c10a1c3e0752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11552", "content": "#exploit\n1. CVE-2024-5907, CVE-2024-9469:\nLPE/Privilege Escalation in Palo Alto Cortex XDR Agent\nhttps://blog.scrt.ch/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective\n\n2. CVE 2024-37397:\nIvanti Endpoint Manager XXE\nhttps://d4mianwayne.github.io/posts/ivanti-endpoint-manager-xxe-cve-2024-37397\n\n3. CVE-2024-52595:\nMutation XSS &amp; lxml_html_clean bypass\nhttps://jorianwoltjer.com/blog/p/hacking/mutation-xss", "creation_timestamp": "2024-12-13T16:50:37.000000Z"}, {"uuid": "22bcc7c3-d4a2-430c-8703-8d635b3fda1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52598", "type": "seen", "source": "https://t.me/cvedetector/11612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52598 - 2FAuth SSRF and URI Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52598 \nPublished : Nov. 20, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : 2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Two interconnected vulnerabilities exist in version 5.4.1 a SSRF and URI validation bypass issue. The endpoint at POST /api/v1/twofaccounts/preview allows setting a remote URI to retrieve the image of a 2fa site. By abusing this functionality, it is possible to force the application to make a GET request to an arbitrary URL, whose content will be stored in an image file in the server if it looks like an image. Additionally, the library does some basic validation on the URI, attempting to filter our URIs which do not have an image extension. However, this can be easily bypassed by appending the string `#.svg` to the URI. The combination of these two issues allows an attacker to retrieve URIs accessible from the application, as long as their content type is text based. If not, the request is still sent, but the response is not reflected to the attacker. Version 5.4.1 fixes the issues. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T17:05:23.000000Z"}, {"uuid": "d0c64db7-4c42-4f91-8054-cd4f87bd35c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52597", "type": "seen", "source": "https://t.me/cvedetector/11608", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52597 - 2FAuth Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-52597 \nPublished : Nov. 20, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : 2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Versions prior to 5.4.1 are vulnerable to stored cross-site scripting due to improper headers in direct access to uploaded SVGs. The application allows uploading images in several places. One of the accepted types of image is SVG, which allows JS scripting. Therefore, by uploading a malicious SVG which contains JS code, an attacker which is able to drive a victim to the uploaded image could compromise that victim's session and access to their tokens. Version 5.4.1 contains a patch for the issue. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T16:15:10.000000Z"}, {"uuid": "25f11dc0-9fe1-4ee6-b453-8dfa23da2604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "seen", "source": "https://t.me/cvedetector/11533", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52595 - \"lxml HTML Cleaner Vulnerability - Cross-Site Scripting via Improper Context-Switching of Special Tags\"\", \n  \"Content\": \"CVE ID : CVE-2024-52595 \nPublished : Nov. 19, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.0, the HTML Parser in lxml does not properly handle context-switching for special HTML tags such as ``, `` and ``. This behavior deviates from how web browsers parse and interpret such tags. Specifically, content in CSS comments is ignored by lxml_html_clean but may be interpreted differently by web browsers, enabling malicious scripts to bypass the cleaning process. This vulnerability could lead to Cross-Site Scripting (XSS) attacks, compromising the security of users relying on lxml_html_clean in default configuration for sanitizing untrusted HTML content. Users employing the HTML cleaner in a security-sensitive context should upgrade to lxml 0.4.0, which addresses this issue. As a temporary mitigation, users can configure lxml_html_clean with the following settings to prevent the exploitation of this vulnerability. Via `remove_tags`, one may specify tags to remove - their content is moved to their parents' tags. Via `kill_tags`, one may specify tags to be removed completely. Via `allow_tags`, one may restrict the set of permissible tags, excluding context-switching tags like ``, `` and ``. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T00:21:54.000000Z"}, {"uuid": "6edffcb6-b41f-40fc-9ce5-c0f0f0c96087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52596", "type": "seen", "source": "https://t.me/cvedetector/11804", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52596 - SimpleSAMLphp XML-External Entity (XXE) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52596 \nPublished : Dec. 2, 2024, 5:15 p.m. | 51\u00a0minutes ago \nDescription : SimpleSAMLphp xml-common is a common classes for handling XML-structures. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 1.19.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T19:35:46.000000Z"}, {"uuid": "62ea5e06-8665-44c6-9ebc-77092c8db2e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "seen", "source": "https://t.me/suboxone_chatroom/1532", "content": "#exploit\n1. CVE-2024-5907, CVE-2024-9469:\nLPE/Privilege Escalation in Palo Alto Cortex XDR Agent\nhttps://blog.scrt.ch/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective\n\n2. CVE 2024-37397:\nIvanti Endpoint Manager XXE\nhttps://d4mianwayne.github.io/posts/ivanti-endpoint-manager-xxe-cve-2024-37397\n\n3. CVE-2024-52595:\nMutation XSS &amp; lxml_html_clean bypass\nhttps://jorianwoltjer.com/blog/p/hacking/mutation-xss", "creation_timestamp": "2025-01-27T07:06:24.000000Z"}]}