{"vulnerability": "CVE-2024-5335", "sightings": [{"uuid": "556bccc6-72f7-49e3-b4bb-a058a34c57ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53354", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3700", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53354\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:09.340\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53354.md", "creation_timestamp": "2025-01-31T23:25:08.000000Z"}, {"uuid": "74b6c291-3b73-465c-979e-48ce0ef3b84e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53355", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3699", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53355\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:09.487\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53355.md", "creation_timestamp": "2025-01-31T23:25:08.000000Z"}, {"uuid": "80190e5e-a524-4dae-a6a8-85989d8bbcda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53356", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53356\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:09.623\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53356.md", "creation_timestamp": "2025-01-31T23:25:04.000000Z"}, {"uuid": "39d9407d-8fca-49b8-a40e-156686fa43ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53357", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53357\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:09.773\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53357.md", "creation_timestamp": "2025-01-31T23:25:03.000000Z"}, {"uuid": "89ee60c9-ece7-419c-a127-64f0410b583b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53351", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8375", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53351\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insecure permissions in pipecd v0.49 allow attackers to gain access to the service account's token, leading to escalation of privileges.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T16:47:24.362Z\n\ud83d\udd17 References:\n1. https://github.com/pipe-cd/pipecd\n2. https://pipecd.dev/\n3. https://gist.github.com/HouqiyuA/948a808b8bd48b17b37a4d5e0b6fb005", "creation_timestamp": "2025-03-21T17:19:12.000000Z"}, {"uuid": "e38e3d17-e358-4bdd-a023-b62c3c1a8597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53350", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8377", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53350\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T16:40:14.608Z\n\ud83d\udd17 References:\n1. https://github.com/kubeslice/kubeslice\n2. https://kubeslice.io/documentation/open-source/1.3.0\n3. https://gist.github.com/HouqiyuA/1cb964206e0d6bebd1c57a124c55fa03", "creation_timestamp": "2025-03-21T17:19:14.000000Z"}, {"uuid": "631f5baf-2e05-4e8e-8425-e20c7eb3a52d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53350", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53350\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-24T18:07:36.466Z\n\ud83d\udd17 References:\n1. https://github.com/kubeslice/kubeslice\n2. https://kubeslice.io/documentation/open-source/1.3.0\n3. https://gist.github.com/HouqiyuA/1cb964206e0d6bebd1c57a124c55fa03", "creation_timestamp": "2025-03-24T18:22:53.000000Z"}, {"uuid": "919900ef-b191-4ced-886d-302c24412775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53354", "type": "seen", "source": "https://t.me/cvedetector/16985", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53354 - EasyVirt DCScope SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-53354 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : EasyVirt DCScope &lt;=8.6.0&lt;=1.3.0\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:40.000000Z"}, {"uuid": "7067097a-404e-4d63-a894-f60e5b15534a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53355", "type": "seen", "source": "https://t.me/cvedetector/16986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53355 - EasyVirt DCScope CO2Scope Incorrect Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53355 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : EasyVirt DCScope &lt;=8.6.0&lt;=1.3.0\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:41.000000Z"}, {"uuid": "005b9e62-efbd-4cc9-a59a-ee1ca7648afc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53355", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941919485129912", "content": "", "creation_timestamp": "2025-02-03T20:48:35.799941Z"}, {"uuid": "27750255-6922-4420-8ea4-9ea2a59dd3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53354", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zkgr6ie2f", "content": "", "creation_timestamp": "2025-01-31T22:15:20.393899Z"}, {"uuid": "9157d173-462b-4763-b116-3c3c1bb03915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53355", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zkje5zo2e", "content": "", "creation_timestamp": "2025-01-31T22:15:23.160172Z"}, {"uuid": "82f26e6b-ef2c-489d-b398-5fa849dbd07c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53356", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zkmadj32f", "content": "", "creation_timestamp": "2025-01-31T22:15:26.148705Z"}, {"uuid": "76b38fa9-e52d-476d-8b8a-56b8d661a4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53357", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zkotmw32c", "content": "", "creation_timestamp": "2025-01-31T22:15:28.932404Z"}, {"uuid": "10cb7420-7aad-46c1-8148-c8e34fb5313a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53355", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqrfbks2k", "content": "", "creation_timestamp": "2025-02-01T01:35:44.839403Z"}, {"uuid": "85b34bcd-5776-4847-97e2-2ccbf5446fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53357", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqrbtd72e", "content": "", "creation_timestamp": "2025-02-01T01:35:44.329050Z"}, {"uuid": "886e1619-6363-4150-b583-81aa823ee175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53354", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqriiys2w", "content": "", "creation_timestamp": "2025-02-01T01:35:45.338967Z"}, {"uuid": "d7a434e9-d613-4bc2-9884-ca806e89478d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53351", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114218429174547340", "content": "", "creation_timestamp": "2025-03-24T16:48:40.408267Z"}, {"uuid": "caadb2b0-1599-4a7d-a270-47fd5bf41927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53351", "type": "seen", "source": "https://t.me/cvedetector/20834", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53351 - Pipecd Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-53351 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Insecure permissions in pipecd v0.49 allow attackers to gain access to the service account's token, leading to escalation of privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:36.000000Z"}, {"uuid": "78f7d49f-08a4-486d-9dbe-f7ec1bfae114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53350", "type": "seen", "source": "https://t.me/cvedetector/20833", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53350 - Kubeslice Service Account Token Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53350 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Insecure permissions in kubeslice v1.3.1 allow attackers to gain access to the service account's token, leading to escalation of privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:35.000000Z"}, {"uuid": "01ea6010-39d2-4f8f-a5b0-9b168da9edb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5335", "type": "seen", "source": "https://t.me/cvedetector/3762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5335 - Elementor Store Kit PHP Object Injection\", \n  \"Content\": \"CVE ID : CVE-2024-5335 \nPublished : Aug. 21, 2024, 9:15 a.m. | 44\u00a0minutes ago \nDescription : The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the _ultimate_store_kit_compare_products cookie in versions up to , and including, 1.6.4. This makes it possible for an unauthenticated attacker to inject a PHP Object.  \n  \nNo POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker or above to delete arbitrary files, retrieve sensitive data, or execute code. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T12:23:29.000000Z"}, {"uuid": "ef6cf4f5-a24e-4d1d-81cf-3d26b018e03b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53353", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ledpthpf7k2y", "content": "", "creation_timestamp": "2024-12-28T04:59:57.435534Z"}, {"uuid": "2fc66952-243b-49fa-a93f-659f032929ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-53353", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ledsr7clzs22", "content": "", "creation_timestamp": "2024-12-28T05:52:16.221717Z"}, {"uuid": "abdc7d51-5134-4094-a77c-cc73f5a0c2a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53353", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lee6xglm3m2q", "content": "", "creation_timestamp": "2024-12-28T09:30:28.990396Z"}, {"uuid": "6d1850a1-6c57-4c68-8e24-63da6c0425dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53353", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3leeva5gjx623", "content": "", "creation_timestamp": "2024-12-28T16:09:03.684496Z"}, {"uuid": "8f464742-06c9-4909-8680-3553c3ad36f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53350", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114201685016971858", "content": "", "creation_timestamp": "2025-03-21T17:50:23.162022Z"}, {"uuid": "3897470d-5638-4b2b-8897-b7e38611bb6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53351", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll56zwxnfa24", "content": "", "creation_timestamp": "2025-03-24T16:39:41.429331Z"}, {"uuid": "ff0d7f51-61b6-48e7-8cef-a41e129fc694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53356", "type": "seen", "source": "https://t.me/cvedetector/16987", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53356 - EasyVirt DCScope &amp; CO2Scope Privilege Escalation Weak Encryption\", \n  \"Content\": \"CVE ID : CVE-2024-53356 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : EasyVirt DCScope &lt;=8.6.0&lt;=1.3.0\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:42.000000Z"}, {"uuid": "a6b1e8f5-a2dc-4547-8f35-ef4c96b3bc36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53357", "type": "seen", "source": "https://t.me/cvedetector/16988", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53357 - EasyVirt CO2Scope Weak Encryption\", \n  \"Content\": \"CVE ID : CVE-2024-53357 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : In EasyVirt DCScope &lt;=8.6.0&lt;=1.3.0,\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:43.000000Z"}, {"uuid": "36fced0a-dd6a-40f4-aa55-16d78fe99580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53356", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941447270433526", "content": "", "creation_timestamp": "2025-02-03T18:48:45.029569Z"}, {"uuid": "d72b6848-b629-46d4-81f3-fa54ea0626b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53356", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqrwpfh2g", "content": "", "creation_timestamp": "2025-02-01T01:35:47.679086Z"}, {"uuid": "c7a0a518-a8b3-449c-a502-796caa9c653f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53351", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll5fxwr3vf26", "content": "", "creation_timestamp": "2025-03-24T18:43:44.293045Z"}, {"uuid": "60841aa7-2464-486f-b026-d6602dc9c705", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53359", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpmerrb4vh2n", "content": "", "creation_timestamp": "2025-05-20T15:13:07.512412Z"}]}