{"vulnerability": "cve-2024-5368", "sightings": [{"uuid": "46d46ff3-afe5-4c1b-a712-fc8306d4c4ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53687", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113813964868545397", "content": "", "creation_timestamp": "2025-01-12T06:28:05.717663Z"}, {"uuid": "870c5993-7e88-426b-9706-6fd39e24e052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53680", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4ohhjm2i", "content": "", "creation_timestamp": "2025-01-11T13:16:35.913767Z"}, {"uuid": "785b769d-8afd-46d1-8010-01b79304034d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53680", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113809896581801885", "content": "", "creation_timestamp": "2025-01-11T13:13:26.519987Z"}, {"uuid": "c6389e1f-df07-450b-8090-2ec3eccabece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53683", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxoed4u25", "content": "", "creation_timestamp": "2025-01-17T18:39:34.094031Z"}, {"uuid": "e9220286-af18-48f2-8f30-edcce31634be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53684", "type": "seen", "source": "https://gist.github.com/Darkcrai86/429c8f390841b2dff6c0c47a3c6ff82b", "content": "", "creation_timestamp": "2025-12-05T12:38:47.000000Z"}, {"uuid": "c7a0f470-c38f-48dd-9797-d65f1b94e4c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-53687", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "523aa6d6-bf35-4df0-b106-733f03b4ed94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53685", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1308", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53685\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nceph: give up on paths longer than PATH_MAX\n\nIf the full path to be built by ceph_mdsc_build_path() happens to be\nlonger than PATH_MAX, then this function will enter an endless (retry)\nloop, effectively blocking the whole task.  Most of the machine\nbecomes unusable, making this a very simple and effective DoS\nvulnerability.\n\nI cannot imagine why this retry was ever implemented, but it seems\nrather useless and harmful to me.  Let's remove it and fail with\nENAMETOOLONG instead.\n\ud83d\udccf Published: 2025-01-11T12:35:40.252Z\n\ud83d\udccf Modified: 2025-01-11T12:35:40.252Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c47ed91156daf328601d02b58d52d9804da54108\n2. https://git.kernel.org/stable/c/99a37ab76a315c8307eb5b0dc095d8ad9d8efeaa\n3. https://git.kernel.org/stable/c/550f7ca98ee028a606aa75705a7e77b1bd11720f", "creation_timestamp": "2025-01-11T13:06:37.000000Z"}, {"uuid": "1d2b99a0-bc54-4526-9ec2-2bccf76251f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53683", "type": "seen", "source": "https://t.me/cvedetector/15711", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53683 - Apple iOS potential tampering of translation files via compromised credentials\", \n  \"Content\": \"CVE ID : CVE-2024-53683 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : A valid set of credentials in a .js file and a static token for   \ncommunication were obtained from the decompiled IPA. An attacker could   \nuse the information to disrupt normal use of the application by changing  \n the translation files and thus weaken the integrity of normal use. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:04.000000Z"}, {"uuid": "27b565a5-c8d0-4574-a9c4-ded25cf177e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53681", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrtxiify42p", "content": "", "creation_timestamp": "2025-01-15T13:16:06.794480Z"}, {"uuid": "41ed391e-166c-4ca4-893d-0266e4b4af58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53687", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4volxj22", "content": "", "creation_timestamp": "2025-01-11T13:16:43.486294Z"}, {"uuid": "c89b458c-b81e-429a-87b0-83b749692dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53689", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4y6md427", "content": "", "creation_timestamp": "2025-01-11T13:16:46.051565Z"}, {"uuid": "53c67370-3895-441d-91d0-944815aa3f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53682", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4qle562k", "content": "", "creation_timestamp": "2025-01-11T13:16:38.351313Z"}, {"uuid": "7816d6a5-69fd-43dd-a4c5-e51251eaf985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53685", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs4svfcx2a", "content": "", "creation_timestamp": "2025-01-11T13:16:40.438327Z"}, {"uuid": "be4ba431-4289-4748-aae8-60d56223078e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53683", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844715420784953", "content": "", "creation_timestamp": "2025-01-17T16:48:19.930750Z"}, {"uuid": "bb57a2e1-7b6a-404a-bcfa-2014e097756c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53683", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcc75u2v2j", "content": "", "creation_timestamp": "2025-01-17T17:15:57.100221Z"}, {"uuid": "936ba845-5c08-41c3-9865-32ab7b5be9c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53684", "type": "seen", "source": "https://infosec.place/objects/fcc180c5-bea6-4b5b-bec5-f92b23b88c85", "content": "", "creation_timestamp": "2025-12-01T15:30:11.448211Z"}, {"uuid": "6693db64-928d-4c0b-bc59-b50b152c51b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53680", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "85547b4e-86f2-4aca-8a48-177ccba473fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53685", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "19504ee2-c0f0-46ee-90b4-275694216139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53683", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2152", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53683\n\ud83d\udd39 Description: A valid set of credentials in a .js file and a static token for \ncommunication were obtained from the decompiled IPA. An attacker could \nuse the information to disrupt normal use of the application by changing\n the translation files and thus weaken the integrity of normal use.\n\ud83d\udccf Published: 2025-01-17T16:44:17.245Z\n\ud83d\udccf Modified: 2025-01-17T16:44:17.245Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01", "creation_timestamp": "2025-01-17T16:56:50.000000Z"}, {"uuid": "92884dd6-708a-4bfd-84f1-fb4ff9688d26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1748", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53681\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: Don't overflow subsysnqn\n\nnvmet_root_discovery_nqn_store treats the subsysnqn string like a fixed\nsize buffer, even though it is dynamically allocated to the size of the\nstring.\n\nCreate a new string with kstrndup instead of using the old buffer.\n\ud83d\udccf Published: 2025-01-15T13:10:22.141Z\n\ud83d\udccf Modified: 2025-01-15T13:10:22.141Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/86645d8d062af3fdcbdaa0a289b95de55bca827d\n2. https://git.kernel.org/stable/c/4db3d750ac7e894278ef1cb1c53cc7d883060496", "creation_timestamp": "2025-01-15T14:16:46.000000Z"}, {"uuid": "c70a3160-66bf-4f20-809a-2ed9fb8d5cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53688", "type": "seen", "source": "https://t.me/cvedetector/13169", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53688 - Adobe AE1021 OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-53688 \nPublished : Dec. 18, 2024, 7:15 a.m. | 24\u00a0minutes ago \nDescription : Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to execute an arbitrary OS command using a crafted HTTP request. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T08:40:30.000000Z"}]}