{"vulnerability": "cve-2024-53676", "sightings": [{"uuid": "d738265a-cd06-4c88-b4ad-0827c09e912c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53676", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "4158755e-62e6-4687-9046-cdb5f3342133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53676", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:45.000000Z"}, {"uuid": "9a8d7544-7ad8-4a9a-b0cd-a36eaad09c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53676", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6552", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53676\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A directory traversal vulnerability in Hewlett Packard Enterprise Insight Remote Support may allow remote code execution.\n\ud83d\udccf Published: 2024-11-27T00:18:28.527Z\n\ud83d\udccf Modified: 2025-03-05T14:58:05.646Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbgn04731en_us", "creation_timestamp": "2025-03-05T15:32:58.000000Z"}, {"uuid": "da5d1828-6c74-402a-ba2d-e96975d297a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53676", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1639/", "content": "", "creation_timestamp": "2024-12-02T05:00:00.000000Z"}, {"uuid": "9f8b5e32-ba15-4263-bf8a-dc1c346007d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53676", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ljlzx7h6dk2m", "content": "", "creation_timestamp": "2025-03-05T03:28:11.886510Z"}, {"uuid": "ff8e691c-9803-4972-b3e8-789d060a9673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53676", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113552106287521279", "content": "", "creation_timestamp": "2024-11-27T00:33:58.043657Z"}, {"uuid": "b921b297-2ca7-4ef3-b9de-b813f58b8653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-53676", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljm6fm4shs24", "content": "", "creation_timestamp": "2025-03-05T04:47:46.117735Z"}]}