{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T18:37:23.220","vulnerabilities":[{"cve":{"id":"CVE-2024-5755","sourceIdentifier":"security@huntr.dev","published":"2024-06-27T19:15:16.400","lastModified":"2024-11-21T09:48:17.093","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' and 'attacker.123@gmail.com'), leading to incorrect synchronization and potential security issues."},{"lang":"es","value":"En las versiones lunary-ai/lunary &lt;=v1.2.11, un atacante puede eludir la validación del correo electrónico utilizando un carácter de punto ('.') en la dirección de correo electrónico. Esto permite la creación de varias cuentas con esencialmente la misma dirección de correo electrónico (por ejemplo, 'attacker123@gmail.com' y 'attacker.123@gmail.com'), lo que genera una sincronización incorrecta y posibles problemas de seguridad."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-821"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.11","matchCriteriaId":"0203D40E-E996-464D-9F62-C3E7193128E6"}]}]}],"references":[{"url":"https://huntr.com/bounties/cf337d37-e602-482b-aa7a-9e34e7f13e1f","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]},{"url":"https://huntr.com/bounties/cf337d37-e602-482b-aa7a-9e34e7f13e1f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}