{"vulnerability": "CVE-2024-5660", "sightings": [{"uuid": "775848a7-1804-4aad-86d6-1d96e11c3f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvm3ceo22", "content": "", "creation_timestamp": "2024-12-27T15:17:55.188181Z"}, {"uuid": "dd7803d3-fa6c-4020-b6d8-6f5dbb08a298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56602", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvoc3cj2l", "content": "", "creation_timestamp": "2024-12-27T15:17:57.652097Z"}, {"uuid": "348b5f89-a306-456f-b111-255adf52256f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56600", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvjn6o42e", "content": "", "creation_timestamp": "2024-12-27T15:17:52.572089Z"}, {"uuid": "ea07bc6e-58df-4273-b62b-c1d03158edeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56608", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbw4e6mr2l", "content": "", "creation_timestamp": "2024-12-27T15:18:12.607684Z"}, {"uuid": "9aa6f12d-33b0-409e-848d-d97f343ff3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56603", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvqeutn2k", "content": "", "creation_timestamp": "2024-12-27T15:17:59.854346Z"}, {"uuid": "969d26a4-f5b3-4cd0-be16-2eefa5000305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56609", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbw6h2zn2m", "content": "", "creation_timestamp": "2024-12-27T15:18:15.034785Z"}, {"uuid": "ef1bd920-0047-404c-847c-65fa32588506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lsjz622x5s2r", "content": "", "creation_timestamp": "2025-06-26T20:55:30.104987Z"}, {"uuid": "62f31ff1-48c6-4075-813c-f48872c99eac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56605", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lsjz622x5s2r", "content": "", "creation_timestamp": "2025-06-26T20:55:30.204400Z"}, {"uuid": "873284e2-84d5-4571-9044-b294f2607808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56603", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0290/", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "98f6b445-dab7-46f1-be4e-31f873e79c11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56604", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "99b4d554-4ba0-4d45-8ea4-c5dd1313314a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56609", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "a6dcf1b8-c0fb-402f-b6b2-609e1c91a409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56608", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lqo4xzgcn222", "content": "", "creation_timestamp": "2025-06-03T01:23:57.310312Z"}, {"uuid": "80e339c3-e095-45fc-a620-b8b1787b866d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56608", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lr6uj6iul22c", "content": "", "creation_timestamp": "2025-06-09T17:07:44.985984Z"}, {"uuid": "b7e758ce-8e23-4c9d-a584-d9c69451284b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56608", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lr6ujc6ymv2e", "content": "", "creation_timestamp": "2025-06-09T17:07:48.556082Z"}, {"uuid": "fce0ad4a-b4f1-40dd-8527-54a224322d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56600", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "502d0685-b516-4a10-b11e-9f4f111d7154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56602", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "ad87c2ea-a69c-441d-b630-18311bc5d822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56606", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "cf3ed3ca-3f98-44bf-9655-763361ae630e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56606", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3me6zzvrufd2z", "content": "", "creation_timestamp": "2026-02-06T13:45:16.351161Z"}, {"uuid": "f63bc08a-dac6-4b9b-9294-9dd3428ddc08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56608", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "c5e235e8-5fd8-4f0a-b388-3a31cbeef419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5660", "type": "seen", "source": "https://t.me/cvedetector/12504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5660 - \"AMD APU Memory Protection Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-5660 \nPublished : Dec. 10, 2024, 2:30 p.m. | 37\u00a0minutes ago \nDescription : Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on A77, A78, A78C, A78AE, A710, V1, V2, V3, V3AE, X1, X1C, X2, X3, X4, N2, X925 &amp; Travis\u00a0may permit bypass of Stage-2 translation and/or GPT protection \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:14.000000Z"}, {"uuid": "fc4281f8-ac24-46ec-a7bb-05f234aba6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56604", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvshtvv2f", "content": "", "creation_timestamp": "2024-12-27T15:18:02.147256Z"}, {"uuid": "120a9f9a-90ee-4a0f-8ae2-1cacac1f3ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56605", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvuvj3e2c", "content": "", "creation_timestamp": "2024-12-27T15:18:04.827412Z"}, {"uuid": "048568d7-efd5-4477-9c0f-aa0fc7eb1e8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56606", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbvxilxs2i", "content": "", "creation_timestamp": "2024-12-27T15:18:07.514427Z"}, {"uuid": "b4181690-9f48-4286-8b82-6b361df8e430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56607", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbw22ewn2i", "content": "", "creation_timestamp": "2024-12-27T15:18:10.210551Z"}, {"uuid": "4f57dedf-2dac-4f6a-a275-0ddb21d71cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lska34c7x22r", "content": "", "creation_timestamp": "2025-06-26T22:59:07.826714Z"}, {"uuid": "2e8da905-78c4-4fde-b140-4175e670e28d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lsmfkxk22k2c", "content": "", "creation_timestamp": "2025-06-27T19:42:47.528208Z"}, {"uuid": "6916f559-7428-4ead-8ba8-a7f80560cd63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56608", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lr6uji37cr2g", "content": "", "creation_timestamp": "2025-06-09T17:07:55.136703Z"}, {"uuid": "8c3f6015-62b6-41b3-ab91-fcbbd295cc24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "f7d14ea3-8df2-4ee2-b784-0b524a8aad8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56603", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "59d52ac9-0bc6-4937-9263-5cd742e68353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56605", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a18745f6-063e-4e09-aa3f-0d9c6454aca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56604", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "99c5ffcf-33a9-4c4f-8d0a-db1512c1138f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56609", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "ff68c0b0-5957-44f5-be53-62d0a95cbd24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-56607", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "f0f558fd-00a9-48c8-b85e-67513c7f8066", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56600", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16643", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56600\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet6: do not leave a dangling sk pointer in inet6_create()\n\nsock_init_data() attaches the allocated sk pointer to the provided sock\nobject. If inet6_create() fails later, the sk object is released, but the\nsock object retains the dangling sk pointer, which may cause use-after-free\nlater.\n\nClear the sock sk pointer on error.\n\ud83d\udccf Published: 2024-12-27T14:51:06.610Z\n\ud83d\udccf Modified: 2025-05-16T07:25:14.556Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f2709d1271cfdf55c670ab5c5982139ab627ddc7\n2. https://git.kernel.org/stable/c/35360255ca30776dee34d9fa764cffa24d0a5f65\n3. https://git.kernel.org/stable/c/276a473c956fb55a6f3affa9ff232e10fffa7b43\n4. https://git.kernel.org/stable/c/79e16a0d339532ea832d85798eb036fc4f9e0cea\n5. https://git.kernel.org/stable/c/706b07b7b37f886423846cb38919132090bc40da\n6. https://git.kernel.org/stable/c/f44fceb71d72d29fb00e0ac84cdf9c081b03cd06\n7. https://git.kernel.org/stable/c/9df99c395d0f55fb444ef39f4d6f194ca437d884", "creation_timestamp": "2025-05-16T07:33:51.000000Z"}, {"uuid": "778d9c53-1713-4969-9472-6e0f7dca6c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56601", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56601\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet: do not leave a dangling sk pointer in inet_create()\n\nsock_init_data() attaches the allocated sk object to the provided sock\nobject. If inet_create() fails later, the sk object is freed, but the\nsock object retains the dangling pointer, which may create use-after-free\nlater.\n\nClear the sk pointer in the sock object on error.\n\ud83d\udccf Published: 2024-12-27T14:51:07.358Z\n\ud83d\udccf Modified: 2025-05-16T07:25:15.700Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f8a3f255f7509a209292871715cda03779640c8d\n2. https://git.kernel.org/stable/c/2bc34d8c8898ae9fddf4612501aabb22d76c2b2c\n3. https://git.kernel.org/stable/c/3e8258070b0f2aba66b3ef18883de229674fb288\n4. https://git.kernel.org/stable/c/b4513cfd3a10c03c660d5d3d26c2e322efbfdd9b\n5. https://git.kernel.org/stable/c/25447c6aaa7235f155292b0c58a067347e8ae891\n6. https://git.kernel.org/stable/c/691d6d816f93b2a1008c14178399061466e674ef\n7. https://git.kernel.org/stable/c/9365fa510c6f82e3aa550a09d0c5c6b44dbc78ff", "creation_timestamp": "2025-05-16T07:33:50.000000Z"}]}