An issue in Zalo v23.09.01 allows attackers to obtain sensitive user information via a crafted GET request.
References
| Link | Resource |
|---|---|
| https://github.com/crysalix4/CVE/tree/main/CVE-2024-53359 | Exploit |
| https://www.linkedin.com/in/le-anh-truong/ | Not Applicable |
Configurations
History
12 Jun 2025, 16:21
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:zalo:zalo:23.09.01:*:*:*:*:*:*:* | |
| References | () https://github.com/crysalix4/CVE/tree/main/CVE-2024-53359 - Exploit | |
| References | () https://www.linkedin.com/in/le-anh-truong/ - Not Applicable | |
| First Time |
Zalo zalo
Zalo |
20 May 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-200 |
20 May 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-20 14:15
Updated : 2025-06-12 16:21
NVD link : CVE-2024-53359
Mitre link : CVE-2024-53359
CVE.ORG link : CVE-2024-53359
JSON object : View
Products Affected
zalo
- zalo
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
