{"vulnerability": "cve-2024-5236", "sightings": [{"uuid": "caff87f5-fb02-4c0a-85f5-faff1cd7302b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52365", "type": "seen", "source": "https://t.me/cvedetector/17292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52365 - IBM Cloud Pak for Business Automation Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52365 \nPublished : Feb. 5, 2025, 12:15 p.m. | 1\u00a0hour, 38\u00a0minutes ago \nDescription : IBM Cloud Pak for Business Automation\u00a018.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2   \n  \nis vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T14:58:16.000000Z"}, {"uuid": "56095d72-4fe2-41ed-b975-1305808d983f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52364", "type": "seen", "source": "https://t.me/cvedetector/17291", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52364 - IBM Cloud Pak for Business Automation Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-52364 \nPublished : Feb. 5, 2025, 12:15 p.m. | 1\u00a0hour, 38\u00a0minutes ago \nDescription : IBM Cloud Pak for Business Automation\u00a018.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T14:58:15.000000Z"}, {"uuid": "ea1bcf01-5769-4114-90b9-019fb7ba531e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52367", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/424", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52367\n\ud83d\udd39 Description: IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system.\n\ud83d\udccf Published: 2025-01-07T11:55:11.030Z\n\ud83d\udccf Modified: 2025-01-07T11:55:11.030Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7180303", "creation_timestamp": "2025-01-07T12:37:56.000000Z"}, {"uuid": "8485f021-d43c-43ca-bb5b-4165b6f4312e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52366", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/421", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52366\n\ud83d\udd39 Description: IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3\u00a0could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.\n\ud83d\udccf Published: 2025-01-07T11:59:53.385Z\n\ud83d\udccf Modified: 2025-01-07T12:01:05.269Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7180303", "creation_timestamp": "2025-01-07T12:37:00.000000Z"}, {"uuid": "b30cd6ee-c475-4a24-a956-a53001ae5221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52363", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2093", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52363\n\ud83d\udd39 Description: IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system.\n\ud83d\udccf Published: 2025-01-17T02:01:17.410Z\n\ud83d\udccf Modified: 2025-01-17T02:01:17.410Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7176515", "creation_timestamp": "2025-01-17T02:56:09.000000Z"}, {"uuid": "17af5231-27f6-45b7-89a9-68f7a2b26189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52364", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5061", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52364\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cloud Pak for Business Automation\u00a018.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-02-05T11:22:17.219Z\n\ud83d\udccf Modified: 2025-02-22T22:09:19.772Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182403", "creation_timestamp": "2025-02-22T22:21:34.000000Z"}, {"uuid": "d9a94674-29ad-4d67-a244-d1a9fbc49ba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52365", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5060", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52365\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cloud Pak for Business Automation\u00a018.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 \n\nis vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-02-05T11:28:32.866Z\n\ud83d\udccf Modified: 2025-02-22T22:09:50.667Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182403", "creation_timestamp": "2025-02-22T22:21:33.000000Z"}, {"uuid": "1c4283c2-f616-47d1-95e5-83de2c056779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52363", "type": "seen", "source": "https://t.me/cvedetector/15676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52363 - IBM InfoSphere Information Server Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52363 \nPublished : Jan. 17, 2025, 2:15 a.m. | 37\u00a0minutes ago \nDescription : IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T04:15:14.000000Z"}, {"uuid": "e4f3f295-7622-4751-8db6-44e7d8f566c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52366", "type": "seen", "source": "https://t.me/cvedetector/14534", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52366 - IBM Concert Software Information Disclosure via Defaults to Insecure Protocols\", \n  \"Content\": \"CVE ID : CVE-2024-52366 \nPublished : Jan. 7, 2025, 12:15 p.m. | 29\u00a0minutes ago \nDescription : IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3\u00a0could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T13:52:38.000000Z"}, {"uuid": "939556d3-570f-414b-a4ab-14cced749bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52361", "type": "seen", "source": "https://t.me/cvedetector/13208", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52361 - IBM Storage Defender Resiliency Service Password Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52361 \nPublished : Dec. 18, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9   \n  \n  \n  \n\u00a0stores user credentials in plain text which can be read by an authenticated user with access to the pod. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T17:52:38.000000Z"}, {"uuid": "14c2e1e2-eb4e-40b1-92b8-8c2de305a459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52369", "type": "seen", "source": "https://t.me/cvedetector/11001", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52369 - Optimal Access Inc. KBucket Unvalidated File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52369 \nPublished : Nov. 14, 2024, 7:15 p.m. | 31\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Optimal Access Inc. KBucket allows Upload a Web Shell to a Web Server.This issue affects KBucket: from n/a through 4.1.6. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:50:56.000000Z"}, {"uuid": "139128e5-f6fd-4071-b1a6-a045dcb3e61d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52366", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5mutq3iw2f", "content": "", "creation_timestamp": "2025-01-07T12:16:06.891751Z"}, {"uuid": "15d55797-7a43-4fa9-a411-47fc2532aadf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52366", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5mutq3iw2f", "content": "", "creation_timestamp": "2025-01-07T12:16:06.906722Z"}, {"uuid": "a211be8f-8aff-4c92-986d-083591c2cae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52363", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfvrkeaptn2r", "content": "", "creation_timestamp": "2025-01-17T02:43:37.811900Z"}, {"uuid": "2002e606-03f5-470b-83a5-16a9c5a551db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52363", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113841234188040532", "content": "", "creation_timestamp": "2025-01-17T02:02:59.649966Z"}, {"uuid": "b6d577cb-2969-4879-9179-597376b2a6a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52363", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113844096138466295", "content": "", "creation_timestamp": "2025-01-17T14:10:50.399750Z"}, {"uuid": "ad7b3e62-8d0d-431b-a4fd-42dd08095161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52362", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "cc199a40-d0d9-46db-b89e-4adcf4c4f0e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52365", "type": "seen", "source": "Telegram/-haXBlCGJbkESwoPGbwgvCOyj7eHoYV27ruDwgZtV5mHNzKH", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "72099255-cefe-4c4d-87f7-0b12332e3cb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52364", "type": "seen", "source": "Telegram/CK358f569vmu6WFMhal8PRo7NPNra5o1BGmOPYhBytIxgX5t", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "050301fe-3475-4bdc-a937-1025b8fa259c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52367", "type": "seen", "source": "https://t.me/cvedetector/14535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52367 - IBM Concert Software Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52367 \nPublished : Jan. 7, 2025, 12:15 p.m. | 29\u00a0minutes ago \nDescription : IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T13:52:38.000000Z"}, {"uuid": "da248ffd-2976-4caf-8de0-77a527fb4936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52360", "type": "seen", "source": "https://t.me/cvedetector/11511", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52360 - IBM Concert Software SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52360 \nPublished : Nov. 19, 2024, 8:15 p.m. | 27\u00a0minutes ago \nDescription : IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T21:51:10.000000Z"}, {"uuid": "4fb1ccd3-4abe-4238-b319-0b4e82dd066d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52363", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfvpzgpsrm2c", "content": "", "creation_timestamp": "2025-01-17T02:16:16.171347Z"}, {"uuid": "9e4df2aa-6def-4129-8c17-047e46a703c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113951067153690514", "content": "", "creation_timestamp": "2025-02-05T11:34:57.740204Z"}, {"uuid": "d8aa8ecf-2bc5-4f73-aa04-d53cd5ec9107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52365", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhgyrvazww2g", "content": "", "creation_timestamp": "2025-02-05T16:33:33.965406Z"}, {"uuid": "e10795f1-bcd4-447c-aa97-7f0ff735ea9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52364", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhgyrvyvyb2q", "content": "", "creation_timestamp": "2025-02-05T16:33:37.561862Z"}, {"uuid": "367e69d0-3a6b-45d5-8033-26a6753524d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52361", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113674605694535623", "content": "", "creation_timestamp": "2024-12-18T15:47:10.604338Z"}, {"uuid": "5332c15a-33d0-4a0d-bd8e-b3b95fe83125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52367", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5muw6ehq2m", "content": "", "creation_timestamp": "2025-01-07T12:16:09.392042Z"}, {"uuid": "bc49e77f-e79e-468b-83bb-ede71a926122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52366", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5oxqibyu2k", "content": "", "creation_timestamp": "2025-01-07T12:53:31.872034Z"}, {"uuid": "a94707b8-6dd4-466d-a816-0d6c672c6120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52367", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5oxqlu2325", "content": "", "creation_timestamp": "2025-01-07T12:53:32.307157Z"}, {"uuid": "a41c9cf8-3761-4c88-b374-1921bcf23583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52364", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhgkfjjdmr2t", "content": "", "creation_timestamp": "2025-02-05T12:16:08.166723Z"}, {"uuid": "43248393-1b52-43f4-9be0-f3c762363548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52365", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhgkflybu42h", "content": "", "creation_timestamp": "2025-02-05T12:16:10.313784Z"}]}