{"vulnerability": "CVE-2024-5696", "sightings": [{"uuid": "dd829234-c504-459d-8f30-6ad3962d8ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56968", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnoudgvt2c", "content": "", "creation_timestamp": "2025-01-27T19:16:26.566091Z"}, {"uuid": "8cba825f-4109-4f5f-9765-90e2e71e9e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56967", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnorfi7p27", "content": "", "creation_timestamp": "2025-01-27T19:16:23.626550Z"}, {"uuid": "bf0bc325-6566-445c-ada4-aab1f11531c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56964", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901991888660207", "content": "", "creation_timestamp": "2025-01-27T19:34:28.578138Z"}, {"uuid": "e40ae0f7-6119-43c8-a07f-363f98e43d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56965", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901991902520489", "content": "", "creation_timestamp": "2025-01-27T19:34:28.880959Z"}, {"uuid": "17036731-6f13-4544-aa69-f25de7af9e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56966", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113902050900528557", "content": "", "creation_timestamp": "2025-01-27T19:49:28.912663Z"}, {"uuid": "67bc2752-9198-4fe2-a636-a7a25ed5b931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56967", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113902050914402952", "content": "", "creation_timestamp": "2025-01-27T19:49:29.190689Z"}, {"uuid": "604a9cfb-3d38-4375-b791-c8888a3548df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56968", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113902050928428217", "content": "", "creation_timestamp": "2025-01-27T19:49:29.447671Z"}, {"uuid": "e3c6b202-72df-4bc3-aa0d-fa9aa19779ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56969", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113902050942128961", "content": "", "creation_timestamp": "2025-01-27T19:49:29.767091Z"}, {"uuid": "97a063a1-68f2-45d8-874b-f1a73e3f5703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56967", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzlxmhza25", "content": "", "creation_timestamp": "2025-01-27T22:49:37.810862Z"}, {"uuid": "cf63c650-970b-4117-bc48-5a36fbe1a3f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56960", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzlxtfo22r", "content": "", "creation_timestamp": "2025-01-27T22:49:38.992088Z"}, {"uuid": "2b3d4641-2020-489e-b63a-a5055b48f2d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56963", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzlxws3q25", "content": "", "creation_timestamp": "2025-01-27T22:49:39.576394Z"}, {"uuid": "3d4ed3dc-1aa0-436c-8fc3-29bffcf7b605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56969", "type": "seen", "source": "https://t.me/cvedetector/16509", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56969 - BeautyPlus iOS Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56969 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Pixocial Technology (Singapore) Pte. Ltd BeautyPlus iOS 7.8.010 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:00.000000Z"}, {"uuid": "dbf3a8c2-6e9e-4c7b-b389-29484b575df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56968", "type": "seen", "source": "https://t.me/cvedetector/16508", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56968 - Govee Home iOS Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56968 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Shenzhen Intellirocks Tech Co. Ltd Govee Home iOS 6.5.01 allows attackers to access sensitive user information via supplying a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:00.000000Z"}, {"uuid": "74aad318-55cc-47fe-865f-cabfdaa97b8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56962", "type": "seen", "source": "https://t.me/cvedetector/16521", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56962 - WeSing iOS Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56962 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Tencent Technology (Shanghai) Co., Ltd WeSing iOS v9.3.39 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:19.000000Z"}, {"uuid": "56f073de-0e6a-4bca-b143-369d1ef6ce17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56960", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnobqxmh27", "content": "", "creation_timestamp": "2025-01-27T19:16:07.265061Z"}, {"uuid": "e3bcf18e-864b-42cc-966b-0ea04a6af471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56962", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnoe4pmp2b", "content": "", "creation_timestamp": "2025-01-27T19:16:09.645053Z"}, {"uuid": "d9f6b02c-caf2-4529-a5d4-a6221b1d8cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56963", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnogm75l2t", "content": "", "creation_timestamp": "2025-01-27T19:16:12.177022Z"}, {"uuid": "d8362209-92ac-4c26-ab4d-5691f3f09a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56964", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnojeero2f", "content": "", "creation_timestamp": "2025-01-27T19:16:15.237072Z"}, {"uuid": "51836b2d-ff77-47ea-a39a-a2689808e026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56965", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnomakdd2e", "content": "", "creation_timestamp": "2025-01-27T19:16:18.020282Z"}, {"uuid": "ce141485-70a1-4ef3-aaaf-b656f155bcfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56966", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnooveto2f", "content": "", "creation_timestamp": "2025-01-27T19:16:20.865339Z"}, {"uuid": "a1dc562a-7c54-4a8c-b55a-98847c4a7d20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56969", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqnowzqhd2n", "content": "", "creation_timestamp": "2025-01-27T19:16:29.331479Z"}, {"uuid": "4d29ebbd-fc36-4978-943d-d05e3f993342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56960", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901932858609641", "content": "", "creation_timestamp": "2025-01-27T19:19:28.042765Z"}, {"uuid": "44ebb1a4-34f9-41c7-838a-4c24698e16ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56962", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901991861032466", "content": "", "creation_timestamp": "2025-01-27T19:34:28.048347Z"}, {"uuid": "97b15579-cdc2-4a3a-a1b7-6eeb82905342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56963", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901991874963032", "content": "", "creation_timestamp": "2025-01-27T19:34:28.323366Z"}, {"uuid": "53982299-8b95-4972-ad77-acfa3327aa1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56962", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzlwpbpg2e", "content": "", "creation_timestamp": "2025-01-27T22:49:33.605629Z"}, {"uuid": "2ad1b35c-b7f3-4a86-bf5c-3d4fbf478d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56965", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzly5g3r2k", "content": "", "creation_timestamp": "2025-01-27T22:49:40.771649Z"}, {"uuid": "712e3179-2833-4d86-be40-4d41fdf303da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56966", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzlxpzko2e", "content": "", "creation_timestamp": "2025-01-27T22:49:38.421833Z"}, {"uuid": "e55e44ff-67ff-489c-bd49-5c2dfa343881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56964", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqzlxdroy25", "content": "", "creation_timestamp": "2025-01-27T22:49:36.623934Z"}, {"uuid": "bb8fad42-cde0-4776-bba5-9af643ccc62a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56964", "type": "seen", "source": "https://t.me/cvedetector/16516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56964 - Guazi Used Car iOS URL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-56964 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Che Hao Duo Used Automobile Agency (Beijing) Co., Ltd Guazi Used Car iOS 10.15.1 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:12.000000Z"}, {"uuid": "09f5272e-7111-4923-aceb-401b46a1744b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56960", "type": "seen", "source": "https://t.me/cvedetector/16514", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56960 - BeiKe Holdings iOS URL Redirection Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56960 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Tianjin Xiaowu Information technology Co., Ltd BeiKe Holdings iOS 1.3.50 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:07.000000Z"}, {"uuid": "1ed4e32f-07db-42a8-ac39-a1ac03e20267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56967", "type": "seen", "source": "https://t.me/cvedetector/16519", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56967 - PolyBuzz iOS Link Injection Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56967 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Cloud Whale Interactive Technology LLC. PolyBuzz iOS 2.0.20 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:14.000000Z"}, {"uuid": "f61d2f71-fe22-4381-b1aa-d256c47318e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56966", "type": "seen", "source": "https://t.me/cvedetector/16518", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56966 - Qidian Reader iOS Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56966 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Shanghai Xuan Ting Entertainment Information &amp; Technology Co., Ltd Qidian Reader iOS 5.9.384 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:13.000000Z"}, {"uuid": "da13f505-9dc2-488a-9385-b272c19e1b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56965", "type": "seen", "source": "https://t.me/cvedetector/16517", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56965 - Shihuo iOS Link Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56965 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Shanghai Shizhi Information Technology Co., Ltd Shihuo iOS 8.16.0 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:13.000000Z"}, {"uuid": "c5c887d5-ff9a-419a-b151-a86d55aa300d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56963", "type": "seen", "source": "https://t.me/cvedetector/16515", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56963 - Sogou Input iOS Informant Access Through Crafted Link\", \n  \"Content\": \"CVE ID : CVE-2024-56963 \nPublished : Jan. 27, 2025, 7:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : An issue in Beijing Sogou Technology Development Co., Ltd Sogou Input iOS 12.2.0 allows attackers to access sensitive user information via supplying a crafted link. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T21:52:11.000000Z"}]}