{"vulnerability": "cve-2024-5233", "sightings": [{"uuid": "ae28b841-2e8b-4512-ab07-db9640030cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52339", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113506283929721656", "content": "", "creation_timestamp": "2024-11-18T22:20:44.308245Z"}, {"uuid": "48fe451a-dbde-4bdb-a460-c587dffb3cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52336", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113549950739566950", "content": "", "creation_timestamp": "2024-11-26T15:25:47.322539Z"}, {"uuid": "e2bb6c16-00bb-47fd-b0f6-b597ecde0df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52338", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113561558585495401", "content": "", "creation_timestamp": "2024-11-28T16:37:48.805064Z"}, {"uuid": "cc93b9cd-895b-4a51-9f6b-252b6dacfd4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113549950754022396", "content": "", "creation_timestamp": "2024-11-26T15:25:47.384570Z"}, {"uuid": "f092af14-c410-4bcf-99b3-e418c78d2523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52335", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113606066036348865", "content": "", "creation_timestamp": "2024-12-06T13:16:38.540436Z"}, {"uuid": "751ddbfa-1eb7-4f01-b1d7-5aaf7fe265ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52335", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113606080937405119", "content": "", "creation_timestamp": "2024-12-06T13:20:26.061122Z"}, {"uuid": "c580c01b-0e10-48e7-9669-809620faf522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52336", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113582884063750866", "content": "", "creation_timestamp": "2024-12-02T11:01:10.244835Z"}, {"uuid": "dd92966e-1a86-4ff0-948b-9f199b4a74a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113582884063750866", "content": "", "creation_timestamp": "2024-12-02T11:01:10.289466Z"}, {"uuid": "a99b9ea7-690b-49fe-880c-4123571007f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52335", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113609606640195798", "content": "", "creation_timestamp": "2024-12-07T04:17:03.569215Z"}, {"uuid": "3cb7c555-5278-4fb4-9fd8-1b1f4343c542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52332", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113810461355752492", "content": "", "creation_timestamp": "2025-01-11T15:37:03.896193Z"}, {"uuid": "154cdd56-d8d8-432a-9675-684f5d409aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52332", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113809896567038168", "content": "", "creation_timestamp": "2025-01-11T13:13:26.164900Z"}, {"uuid": "6dc192c1-1dc2-4d0e-ab7a-16361165dbc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52332", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4lksar2l", "content": "", "creation_timestamp": "2025-01-11T13:16:32.975022Z"}, {"uuid": "4c1420a8-08aa-4e74-a653-adb3c552ed10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113821491830819005", "content": "", "creation_timestamp": "2025-01-13T14:22:15.750640Z"}, {"uuid": "97d79a1f-a6df-4176-a267-d4dd4acbcdc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmzoz67mw2p", "content": "", "creation_timestamp": "2025-01-13T15:15:26.135320Z"}, {"uuid": "db8190d5-6083-4b01-bbd9-57a54e0f5bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37uk6pl2g", "content": "", "creation_timestamp": "2025-01-13T15:42:45.464901Z"}, {"uuid": "75480896-7fdc-494e-8543-07a2b78a6865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37v2flc2y", "content": "", "creation_timestamp": "2025-01-13T15:42:46.627840Z"}, {"uuid": "02397930-02b2-48a4-8bd8-b0c8257f6a0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113821831184460017", "content": "", "creation_timestamp": "2025-01-13T15:48:33.400561Z"}, {"uuid": "62bc8083-c340-4b5f-b31e-aa83a881d995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52331", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgggguul3a2b", "content": "", "creation_timestamp": "2025-01-23T17:40:06.130772Z"}, {"uuid": "f5206827-7203-40e6-813f-bb1fb3613eb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52330", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lggggvsowy2b", "content": "", "creation_timestamp": "2025-01-23T17:40:11.093818Z"}, {"uuid": "6307daa0-9e45-4bf6-bf16-35e4fb91b9a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52336", "type": "seen", "source": "Telegram/5kMqY-Ap44ThwWL9oupIAHfi-sUGPlayfYQLXsdRLJgDwpSu", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "b195baf8-0cda-464a-88a0-83cfb3c82c7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "Telegram/HsGWb5fWeHnql6wAF2VupooJKdqpgEyq7CSQf5WtZicr1kgp", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "3d3c251f-108a-42ec-946d-5527f3054824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "https://t.me/CyberBulletin/26676", "content": "\u26a1\ufe0fCVE-2024-52336 &amp; CVE-2024-52337: Vulnerabilities in Linux Tuned Daemon.\n\n#CyberBulletin", "creation_timestamp": "2024-12-02T15:54:15.000000Z"}, {"uuid": "9e7068f2-e17e-453c-a671-05c8db1e8428", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52336", "type": "seen", "source": "https://t.me/CyberBulletin/26676", "content": "\u26a1\ufe0fCVE-2024-52336 &amp; CVE-2024-52337: Vulnerabilities in Linux Tuned Daemon.\n\n#CyberBulletin", "creation_timestamp": "2024-12-02T15:54:15.000000Z"}, {"uuid": "261786d2-f8d4-4efd-9c38-79e8d64ff12c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5266", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52337\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.\n\ud83d\udccf Published: 2024-11-26T15:21:17.538Z\n\ud83d\udccf Modified: 2025-02-25T11:46:21.468Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:10381\n2. https://access.redhat.com/errata/RHSA-2024:10384\n3. https://access.redhat.com/errata/RHSA-2024:11161\n4. https://access.redhat.com/errata/RHSA-2025:0195\n5. https://access.redhat.com/errata/RHSA-2025:0327\n6. https://access.redhat.com/errata/RHSA-2025:0368\n7. https://access.redhat.com/errata/RHSA-2025:0879\n8. https://access.redhat.com/errata/RHSA-2025:0880\n9. https://access.redhat.com/errata/RHSA-2025:0881\n10. https://access.redhat.com/errata/RHSA-2025:1785\n11. https://access.redhat.com/errata/RHSA-2025:1802\n12. https://access.redhat.com/security/cve/CVE-2024-52337\n13. https://bugzilla.redhat.com/show_bug.cgi?id=2324541\n14. https://security.opensuse.org/2024/11/26/tuned-instance-create.html\n15. https://www.openwall.com/lists/oss-security/2024/11/28/1", "creation_timestamp": "2025-02-25T12:24:13.000000Z"}, {"uuid": "7b6143a0-5cae-499f-98d4-b917af7fdf2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52336", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17097", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52336\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.\n\ud83d\udccf Published: 2024-11-26T15:21:13.518Z\n\ud83d\udccf Modified: 2025-05-21T01:04:32.633Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:10384\n2. https://access.redhat.com/errata/RHSA-2025:0879\n3. https://access.redhat.com/errata/RHSA-2025:0880\n4. https://access.redhat.com/security/cve/CVE-2024-52336\n5. https://bugzilla.redhat.com/show_bug.cgi?id=2324540\n6. https://security.opensuse.org/2024/11/26/tuned-instance-create.html\n7. https://www.openwall.com/lists/oss-security/2024/11/28/1", "creation_timestamp": "2025-05-21T01:45:15.000000Z"}, {"uuid": "4f1f56b8-d239-432e-a34b-e196b3ce3fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52336", "type": "seen", "source": "https://t.me/CyberBulletin/1664", "content": "\u26a1\ufe0fCVE-2024-52336 &amp; CVE-2024-52337: Vulnerabilities in Linux Tuned Daemon.\n\n#CyberBulletin", "creation_timestamp": "2024-12-02T15:54:15.000000Z"}, {"uuid": "979d512d-52dc-4877-b597-227cdd3a666e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52338", "type": "seen", "source": "https://t.me/CyberBulletin/1656", "content": "\u26a1\ufe0fCVE-2024-52338: Critical Security Flaw in Apache Arrow R Package Allows Arbitrary Code Execution. \n\n#CyberBulletin", "creation_timestamp": "2024-11-30T10:50:13.000000Z"}, {"uuid": "bfc85aaa-8a0e-4c4c-8301-ce1a7bac758e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52338", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15954", "content": "\u200aCVE-2024-52338: Critical Security Flaw in Apache Arrow R Package Allows Arbitrary Code Execution\n\nhttps://securityonline.info/cve-2024-52338-critical-security-flaw-in-apache-arrow-r-package-allows-arbitrary-code-execution/", "creation_timestamp": "2024-11-30T16:44:29.000000Z"}, {"uuid": "01b32a9d-8fbd-467c-a807-d27c16df9acf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52330", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggf3jcdp32e", "content": "", "creation_timestamp": "2025-01-23T17:15:50.638104Z"}, {"uuid": "ab9cbdf5-c895-48ee-9432-7a8a80963539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52331", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggf3mf72m2t", "content": "", "creation_timestamp": "2025-01-23T17:15:53.714356Z"}, {"uuid": "763ef670-cf1a-4b96-a540-7608ed581bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52332", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "deb1f499-3e0b-44e0-98b6-57f4b5ab8b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52335", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9332", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)\nURL\uff1ahttps://github.com/cloudefence/CVE-2024-52335\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-06T20:06:36.000000Z"}, {"uuid": "f0861155-9813-4804-865a-bd6261184a5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/956", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52337\n\ud83d\udd39 Description: A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.\n\ud83d\udccf Published: 2024-11-26T15:21:17.538Z\n\ud83d\udccf Modified: 2025-01-09T15:02:19.060Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:10381\n2. https://access.redhat.com/errata/RHSA-2024:10384\n3. https://access.redhat.com/errata/RHSA-2024:11161\n4. https://access.redhat.com/errata/RHSA-2025:0195\n5. https://access.redhat.com/security/cve/CVE-2024-52337\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2324541\n7. https://security.opensuse.org/2024/11/26/tuned-instance-create.html\n8. https://www.openwall.com/lists/oss-security/2024/11/28/1", "creation_timestamp": "2025-01-09T15:14:10.000000Z"}, {"uuid": "c38b41bb-9003-41bc-b76c-ecb2dac2d528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52337", "type": "seen", "source": "https://t.me/CyberBulletin/1664", "content": "\u26a1\ufe0fCVE-2024-52336 &amp; CVE-2024-52337: Vulnerabilities in Linux Tuned Daemon.\n\n#CyberBulletin", "creation_timestamp": "2024-12-02T15:54:15.000000Z"}, {"uuid": "e7090da9-0844-4d4d-9d80-6fe18443fa2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52331", "type": "seen", "source": "https://t.me/cvedetector/16211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52331 - ECOVACS Robot Firmware Decryption Vulnerability (Symmetric Key Exposure)\", \n  \"Content\": \"CVE ID : CVE-2024-52331 \nPublished : Jan. 23, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : ECOVACS robot lawnmowers and vacuums use a deterministic symmetric key to decrypt firmware updates. An attacker can create and encrypt malicious firmware that will be successfully decrypted and installed by the robot. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:09:14.000000Z"}, {"uuid": "7405b498-651f-45c1-b003-dff08d52f79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52330", "type": "seen", "source": "https://t.me/cvedetector/16210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52330 - ECOVACS TLS Certificate Validation Weakness (Certificate Invalidity; SSL/TLS)\", \n  \"Content\": \"CVE ID : CVE-2024-52330 \nPublished : Jan. 23, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : ECOVACS lawnmowers and vacuums do not properly validate TLS certificates. An unauthenticated attacker can read or modify TLS traffic, possibly modifying firmware updates. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:09:10.000000Z"}, {"uuid": "40831199-9a12-4fc8-ad46-d836d1ed7098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://t.me/cvedetector/15154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52333 - A foundry OFFIS DCMTK Array Index Validation Bypass Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52333 \nPublished : Jan. 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : An improper array index validation vulnerability exists in the determineMinMax functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T17:04:37.000000Z"}, {"uuid": "ef3cffc2-bd41-45f6-9c3e-ea531d1c7278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52339", "type": "seen", "source": "https://t.me/cvedetector/11409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52339 - Mage Front End Forms Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-52339 \nPublished : Nov. 18, 2024, 11:15 p.m. | 30\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mage Cast Mage Front End Forms allows Stored XSS.This issue affects Mage Front End Forms: from n/a through 1.1.4. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T00:55:10.000000Z"}, {"uuid": "894fe1f1-c428-4c2c-a3dc-e795157bfd53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52338", "type": "seen", "source": "https://t.me/CyberBulletin/26667", "content": "\u26a1\ufe0fCVE-2024-52338: Critical Security Flaw in Apache Arrow R Package Allows Arbitrary Code Execution. \n\n#CyberBulletin", "creation_timestamp": "2024-11-30T10:50:12.000000Z"}]}