{"vulnerability": "cve-2024-5383", "sightings": [{"uuid": "637ced65-6060-457d-a7c3-3cc851a70f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53832", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lj6h4keucn2o", "content": "", "creation_timestamp": "2025-02-27T17:46:29.520399Z"}, {"uuid": "0bb71b0f-83b3-4b90-a4bc-42f0fb4c9790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53832", "type": "seen", "source": "https://t.me/cvedetector/12507", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53832 - \"CPCI85 Physical Access SPI Bus Password Exposure\"\", \n  \"Content\": \"CVE ID : CVE-2024-53832 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions &lt; V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication, and then use the secure element as an oracle to decrypt all encrypted update files. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:16.000000Z"}, {"uuid": "47b8f3d5-01f2-4683-a81e-f358a7d8bcae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53832", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-01", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "cc64f8b5-3d3f-4726-8d2e-b84061ecf662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53839", "type": "seen", "source": "https://t.me/cvedetector/14210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53839 - \"Qualcomm Protocol Network Adapter Buffer Overflow\"\", \n  \"Content\": \"CVE ID : CVE-2024-53839 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:59.000000Z"}, {"uuid": "f08eb869-b73b-48b7-be78-0849b0045533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53838", "type": "seen", "source": "https://t.me/cvedetector/14209", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53838 - Samsung Exynos Video API Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53838 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:58.000000Z"}, {"uuid": "20459ca0-5eb1-4c1b-af31-ab2905224d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53836", "type": "seen", "source": "https://t.me/cvedetector/14208", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53836 - W-Bravo Communication WBRC Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53836 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In wbrc_bt_dev_write of wb_regon_coordinator.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:58.000000Z"}, {"uuid": "1fb26499-7b42-492a-b8fe-0eae40ee856a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53837", "type": "seen", "source": "https://t.me/cvedetector/14207", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53837 - \"Lwis Periodic Io Out-of-Bounds Write Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-53837 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:57.000000Z"}, {"uuid": "d8901ff0-31e7-4357-a373-b9481dd6cc1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53834", "type": "seen", "source": "https://t.me/cvedetector/14206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53834 - Android SMS to-string Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53834 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:53.000000Z"}, {"uuid": "86281c96-c183-4846-9248-0d8fb95d6f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53835", "type": "seen", "source": "https://t.me/cvedetector/14205", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53835 - Apache Biometric Bypass Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53835 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:52.000000Z"}, {"uuid": "3a501b95-b08a-47e8-a7d8-d83749be9882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53833", "type": "seen", "source": "https://t.me/cvedetector/14203", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53833 - Apache LWis Out-of-Bounds Write Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-53833 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In prepare_response_locked of  lwis_transaction.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:08:51.000000Z"}, {"uuid": "c09c66a0-d75f-4c5f-a857-867e329b8d7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53833", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762339358720452", "content": "", "creation_timestamp": "2025-01-03T03:38:59.995780Z"}, {"uuid": "880b11fb-29e5-403a-86f7-6896c7fb73ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53834", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762339373093301", "content": "", "creation_timestamp": "2025-01-03T03:39:00.252846Z"}, {"uuid": "f7e3ad39-da70-418a-ac6c-7f6d1358f900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53835", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762398372779926", "content": "", "creation_timestamp": "2025-01-03T03:54:00.374846Z"}, {"uuid": "40792bf9-7527-4b7a-ad6a-a57c8ebf31a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53836", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762398386811078", "content": "", "creation_timestamp": "2025-01-03T03:54:00.685529Z"}, {"uuid": "92d112dc-fab4-4092-a232-f93755c263ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53837", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762398400756740", "content": "", "creation_timestamp": "2025-01-03T03:54:00.966376Z"}, {"uuid": "c5eb59ea-3ab1-48db-8f70-77aba9588e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53838", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762398414721274", "content": "", "creation_timestamp": "2025-01-03T03:54:01.138199Z"}, {"uuid": "dfeb5410-da19-46c4-82cf-4eabd72c0d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53839", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762457418041862", "content": "", "creation_timestamp": "2025-01-03T04:09:01.501348Z"}, {"uuid": "1bd35956-d047-4845-b690-ca30a7d745b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53833", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq5v7fz425", "content": "", "creation_timestamp": "2025-01-03T04:15:34.594192Z"}, {"uuid": "a2afcb5c-f34b-4b68-a271-7cec5260a06b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53834", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq5xllhr2i", "content": "", "creation_timestamp": "2025-01-03T04:15:36.956777Z"}, {"uuid": "9e172564-4120-444c-8576-2cc28cc50004", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53835", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq62bjag25", "content": "", "creation_timestamp": "2025-01-03T04:15:39.872905Z"}, {"uuid": "0e2fa80c-f785-40e3-a9e5-534fab15aa21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53836", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq64jdeo22", "content": "", "creation_timestamp": "2025-01-03T04:15:42.167551Z"}, {"uuid": "a00047a7-55f4-4a8d-b716-7781c38e02eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53837", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq66pen22l", "content": "", "creation_timestamp": "2025-01-03T04:15:44.628871Z"}, {"uuid": "60abf3eb-faab-4298-8d39-f0e11a437f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53838", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6b4te72c", "content": "", "creation_timestamp": "2025-01-03T04:15:47.071599Z"}, {"uuid": "3573a067-e400-4e90-8dbe-d00e4fc77720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53839", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6dyr7625", "content": "", "creation_timestamp": "2025-01-03T04:15:50.159066Z"}, {"uuid": "cc97cb0e-fc5d-4718-b5d9-e506e17e2d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53838", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroekrui2e", "content": "", "creation_timestamp": "2025-01-03T04:42:42.490975Z"}, {"uuid": "b5138c1f-386a-4405-88c0-854e01cdadc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53837", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroethvb2k", "content": "", "creation_timestamp": "2025-01-03T04:42:43.514084Z"}, {"uuid": "165085aa-6778-436b-86b0-bfe77d8b641c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53834", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroexflr2i", "content": "", "creation_timestamp": "2025-01-03T04:42:44.006045Z"}, {"uuid": "3c20c023-83c4-4204-adcb-4e6555c52d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53836", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrof2mp42b", "content": "", "creation_timestamp": "2025-01-03T04:42:44.533038Z"}, {"uuid": "482cc2ae-b101-492d-99a5-4861c68f5d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53839", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrofdftv2q", "content": "", "creation_timestamp": "2025-01-03T04:42:45.593859Z"}, {"uuid": "614738cb-b20c-4df6-8f11-faacc0cbd490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53833", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrofimt72y", "content": "", "creation_timestamp": "2025-01-03T04:42:46.095846Z"}, {"uuid": "cf5b39e2-32b2-4f32-ab85-4995855197a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53835", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrofly3h2h", "content": "", "creation_timestamp": "2025-01-03T04:42:46.612311Z"}]}