{"vulnerability": "cve-2024-51378", "sightings": [{"uuid": "d5d59b66-8285-4586-b5bb-cca667945935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "99c32963-4180-42bc-aaa9-7dfe31c49109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://bsky.app/profile/kooteksec.bsky.social/post/3lqhsbnof2c22", "content": "", "creation_timestamp": "2025-05-31T12:56:38.864138Z"}, {"uuid": "fbefd3f2-680c-4d5c-b73a-84473bc6ce85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "55b144ce-4014-4d6b-9c3c-6fc28f4ba5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb", "content": "", "creation_timestamp": "2024-12-05T17:41:42.000000Z"}, {"uuid": "2df421d0-12d1-40b4-9b06-26ea53d5c56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9705", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA Python script to scan websites for the CVE-2024-51378 vulnerability.\nURL\uff1ahttps://github.com/i0x29A/CVE-2024-51378\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2025-01-03T08:10:10.000000Z"}, {"uuid": "70c101de-61b3-4a23-965e-da7a1125a685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://t.me/codeby_sec/8595", "content": "\u0412 \u0447\u0435\u043c \u043e\u0442\u043b\u0438\u0447\u0438\u0435 CVE \u0438 CWE\n\n\u25b6\ufe0fCVE (Common Vulnerabilities and Exposures) \u2013 \u044d\u0442\u043e \u0441\u043f\u0438\u0441\u043e\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\n\u041f\u0440\u0438\u043c\u0435\u0440: CVE-2024-51378 - \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0421yberPanel, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u25b6\ufe0fCWE (Common Weakness Enumeration) \u2013 \u043e\u0431\u0449\u0438\u0439 \u043f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 (\u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432) \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\u041f\u0440\u0438\u043c\u0435\u0440: CWE-89 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a\u043e \u0432\u0441\u0435\u043c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f\u043c \u2014 \u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0442\u0438\u0432\u043d\u043e\u043c\u0443 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0443, \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u044e\u0449\u0435\u043c\u0443 \u043f\u0443\u0442\u044c \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u0431\u0430\u0437\u0443 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\ud83d\udca0 \u041a\u043b\u044e\u0447\u0435\u0432\u043e\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u0438\u0435\n\u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043c\u0435\u0436\u0434\u0443 CVE \u0438 CWE \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0438\u0445 \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0438. \n\ud83d\udca0 CVE \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u0444\u0430\u043a\u0442 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u042d\u0442\u043e \u0437\u0430\u043f\u0438\u0441\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\ud83d\udca0 CWE \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u043f\u0440\u0438\u0447\u0438\u043d\u0443 \u0432\u043e\u0437\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u044e \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0447\u0430\u0441\u0442\u043e \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\ud83d\udca0 \u041f\u0440\u0438\u043c\u0435\u0440 \u0432\u0437\u0430\u0438\u043c\u043e\u0441\u0432\u044f\u0437\u0438 CVE \u0438 CWE\n\u0412\u043e\u0437\u044c\u043c\u0451\u043c CVE-2024-51378, \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0439 \u0440\u0430\u043d\u0435\u0435. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 CyberPanel \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u043c\u0438 CWE, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440:\n\ud83d\udca0 CWE-287 (\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f) \u2014 \u043e\u0441\u043d\u043e\u0432\u043d\u0430\u044f \u043f\u0440\u0438\u0447\u0438\u043d\u0430, \u043f\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438.\n\ud83d\udca0 CWE-78 (\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u0430\u044f \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434\u0430\u0445) \u2014 \u043f\u0440\u0438\u0447\u0438\u043d\u0430, \u043f\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.", "creation_timestamp": "2024-12-19T07:22:35.000000Z"}, {"uuid": "55488298-8d31-48c3-bb09-1df02c12fe8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://t.me/breachdetector/785917", "content": "{\n  \"Source\": \"Darkforums[.]st\",\n  \"Content\": \"[CVE-2024-51378] CyberPanel Pre-Auth RCE via Command Injection\", \n  \"author\": \"cache\",\n  \"Detection Date\": \"13 Jun 2025\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2025-06-13T22:47:21.000000Z"}, {"uuid": "0297b426-c38a-4c27-8b54-7f886f0be1c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "Telegram/hAHua5d1pVQC4hevr5d9AFlXU4JaWCrjE_B310OODrBehQ", "content": "", "creation_timestamp": "2024-12-05T08:30:48.000000Z"}, {"uuid": "cd4d4a88-c0ec-4767-8766-67dc6a9ad360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/159781", "content": "CVE-2024-51378 CyberPanel Command Injection\n*\nWriteUp\n*\nexploit", "creation_timestamp": "2024-12-05T10:17:10.000000Z"}, {"uuid": "48bf2d6e-15b9-4667-85e6-01f04096d41a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "Telegram/NlX5iIOkjAyu_cnVBsoaTsLGKP0OmWGGQtJGzMbvFGfWaLno", "content": "", "creation_timestamp": "2024-12-08T16:38:58.000000Z"}, {"uuid": "29a5ab59-8d93-47f6-9ce7-35e1a9eed69d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://thehackernews.com/2024/12/cisa-warns-of-active-exploitation-of.html", "content": "", "creation_timestamp": "2024-12-05T04:09:00.000000Z"}, {"uuid": "d1b5ff31-eec6-41d5-ac76-55fbe4e97071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113597361615148511", "content": "", "creation_timestamp": "2024-12-05T00:22:59.284498Z"}, {"uuid": "a225c9f0-4b32-4f93-92f6-5a92232f657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:05.000000Z"}, {"uuid": "485af23a-9516-4a93-b71d-d7e0f2ea8184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:02.000000Z"}, {"uuid": "587573ec-dbf4-415d-b1f2-0f96062c8edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f8280b1b-b59e-4819-a170-9b84531385c1", "content": "", "creation_timestamp": "2026-02-02T12:26:19.181734Z"}, {"uuid": "7dd25977-3334-4360-9a42-7b969ef56300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f8280b1b-b59e-4819-a170-9b84531385c1", "content": "", "creation_timestamp": "2026-02-02T12:26:19.181734Z"}, {"uuid": "64ec9368-8440-4b8c-bb36-eeefffc0d6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "Telegram/sh_Wj4yVZfYZ8SMMOaybmV9yApMn3mNDIaTU298AM_pVdB8", "content": "", "creation_timestamp": "2025-11-11T21:00:05.000000Z"}, {"uuid": "e2d2cef4-1f9a-48b2-9b90-0f813461692f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8886", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aExploit for CyberPanel RCE via Command Injection\nURL\uff1ahttps://github.com/refr4g/CVE-2024-51378\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-10-30T02:57:23.000000Z"}, {"uuid": "ee90db37-f031-4182-8a17-52ac6413f4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://t.me/softrinx/708", "content": "CVE-2024-51378 CyberPanel Command Injection\n*\nWriteUp\n*\nexploit", "creation_timestamp": "2024-12-05T10:17:10.000000Z"}, {"uuid": "b745c5f8-94f4-4490-9129-5309e83b97b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2408", "content": "CVE-2024-51378 CyberPanel Command Injection\n*\nWriteUp\n*\nexploit", "creation_timestamp": "2024-12-05T10:07:16.000000Z"}, {"uuid": "43c73204-f297-4273-b76c-0e929fdc1a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-12-12T15:10:03.000000Z"}, {"uuid": "9f9ba8d3-b414-45fd-a949-3f2534b445b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmngl3o2pb2t", "content": "", "creation_timestamp": "2025-04-12T21:02:21.893881Z"}, {"uuid": "5adaae3d-7f98-434c-aaf0-d015c03da078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "https://t.me/cvedetector/9380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51378 - CyberPanel FTP Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51378 \nPublished : Oct. 29, 2024, 11:15 p.m. | 23\u00a0minutes ago \nDescription : getresetstatus in dns/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T00:49:07.000000Z"}, {"uuid": "a9db5a35-2d4d-4705-8a21-6a4be1877060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/6249", "content": "\ud83d\udea8PoC for CVE-2024-51378; CyberPanel Command Injection Vulnerability\n\nhttps://darkwebinformer.com/poc-for-cve-2024-51378-cyberpanel-command-injection-vulnerability/", "creation_timestamp": "2024-11-01T15:52:35.000000Z"}, {"uuid": "4c13266d-6227-479b-b428-4a0a1251132d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113595364674270813", "content": "", "creation_timestamp": "2024-12-04T15:55:08.719236Z"}, {"uuid": "7eddc872-9dc1-4a0f-b0fa-e8c951b1778d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2823029", "content": "", "creation_timestamp": "2024-12-04T17:40:15.011772Z"}]}